Cross-site scripting in Essential Real Estate - #VU19047
Published: July 8, 2019
Essential Real Estate
Detailed vulnerability description
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data passed via the "package_user" and "property_author" parameters to /wp-admin/edit.php script. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Exploitation examples:
https://[host]/wp-admin/edit.php?post_status=all&post_type=user_package&package_user="><svg/onload=alert(/XSS/)>&filter_action=Filter&paged=1
https://[host]/wp-admin/edit.php?post_status=all&post_type=property&property_author="><svg/onload=alert(/XSS/)>&property_identity&filter_action=Filter&paged=1