Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-24807 PoC — WordPress 插件 跨站脚本漏洞

Source
Associated Vulnerability
Title:WordPress 插件 跨站脚本漏洞 (CVE-2021-24807)
Description:WordPress是Wordpress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress 插件是WordPress开源的一个应用插件。 Wordpress Plugin Support Board 中存在跨站脚本漏洞,该漏洞源于产品未对notes字段的数据做有效验证。攻击者可通过该漏洞执行客户端代码。以下产品及版本受到影响:Wordpress Plugin Support Board 3.3.5 之前版本。
Description
Support Board 3.3.4 Authenticated Stored XSS
Readme
# CVE-2021-24807
Support Board 3.3.4 Authenticated Stored XSS

Authenticated Stored Cross Site Scripting (XSS) Vulnerability exists in Support Board Version 3.3.4 via Notes parameter.

The impact of cross-site scripting vulnerabilities can vary from one web application to another. It ranges from session hijacking to credential theft and other security vulnerabilities. By exploiting a cross-site scripting vulnerability, an attacker can impersonate a legitimate user and take over their account. If the victim user has administrative privileges, it might lead to severe damage such as modifications in code or databases to further weaken the security of the web application, depending on the rights of the account and the web application.

To Exploit this Vulnerabilites you need to have Agent or Admin Level Access.

### Add Notes Function

To exploit this parameter we need to go to chat and click on the + icon on the right side of the Notes and add like some text and press Add and intercept with BurpSuite
![enter image description here](https://cdn-images-1.medium.com/max/800/1*MdEk_L4IZlYUrqNpnvAURg.png)

As you can see in the Burpsuite Requests we can see the message Parameter we need to add the Payload inside it

<ScRiPt>alert(document.cookie)</sCriPt>

and Send the Request
![enter image description here](https://cdn-images-1.medium.com/max/1200/1*tAcwXhIG6_vfaEbvI__x2g.png)
now if we reload the webpage it will automatically show the cookies
![enter image description here](https://cdn-images-1.medium.com/max/800/1*lObsbeV4LxjThXD08awKpA.png)


Readmore:  
[Medium](https://medium.com/@lijohnjefferson/6bc22af2a444)  
[TIStory]()
File Snapshot

[4.0K] /data/pocs/dd314f19a1081b2400e574fbe1b81ffb92e8d375 └── [1.6K] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.