WordPress Plugin Quiz And Survey...

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

### Vulnerability A CSRF vulnerability allows an unauthenticated attacker to add questions to existing quizzes. The question_name parameter is put into a manually-constructed JavaScript object and escaped with esc_js() (php/qmn_options_questions_tab.php line 499). If the user (or attacker) creates a new question on a quiz containing “`<script>alert(1)</script>`” in the question_name field then “question: ‘`&lt;script&gt;alert(1)&lt;/script&gt;`’,” will get output inside the JS object. All good so far. However, in js/admin_question.js on line 205, we see this line, as part of some JS-generated HTML: jQuery('<textarea/>').html(questions_list[i].question.replace(/"/g, '"').replace(/'/g, "'")).text()+ This looks okay. We’re creating a TEXTAREA element, setting its HTML to the value of the question_name parameter, and extracting the .text() of it. If we did jQuery(‘<textarea/>’).html(‘<`script>alert(1)</script>`’).text() we would get “alert(1)” as the output. However, that’s not how...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息