SB2019102104 - Reflected cross-site scripting in Broken Link Checker plugin for WordPress
Published: October 21, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Reflected cross-site scripting (CVE-ID: CVE-2019-16521)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to improper encoding and insertion of an HTTP GET parameter into HTML. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website, such as exploit the filter function on the page listing all detected broken links by providing an XSS payload in the "s_filter" GET parameter in the "filter_id=search" request.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
PoC:
https://<host>/wp-admin/tools.php?page=view-broken-links&filter_id=search&s_filter=%22+id%3D%22blc-links%22%3E%3Cscript%3Ealert%281%29%3C%2Fscript%3E Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.