InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

CVE-2023–39308: User Feedback <= 1.0.7 — Unauthenticated Stored XSS

CVE-2023–39308: Wordpress Plugin User Feedback <= 1.0.7 — Unauthenticated Stored XSS

Summary

Submit Feedback feature doesn’t filter submitted Text. So, Attacker can submit malicious script. For example, the malicious script can be use to steal cookie or other information with Cross Site Scripting (XSS) Attack.

About Plugins

User Feedback — Create Interactive Feedback Form, User Surveys, and Polls in Seconds

Vulnerable Code

  • Filename: wp-content/plugins/userfeedback-lite/includes/db/class-userfeedback-frontend.php
  • Code:
public function save_survey_response(WP_REST_Request $request)
{

if (!wp_verify_nonce($request->get_param('nonce'), "userfeedback_survey_submission-{$request['id']}")) {

return new WP_REST_Response(null, 403);

}

$survey_id = $request['id'];

$id_address = UserFeedback_Device_Detect::ip();

$os = UserFeedback_Device_Detect::os();

$browser = UserFeedback_Device_Detect::browser();

$device = UserFeedback_Device_Detect::deviceType();


// Validate Answers
$validation = $this->validate_response_answers($request->get_json_params()['answers'], $survey_id);

if (!$validation['success']) {
$status = isset($validation['status']) ? $validation['status'] : 400;
return new WP_REST_Response(
array(
'success' => false,
'errors' => $validation['errors'],
),
$status
);
}

$response_id = UserFeedback_Response::create(
array_merge(
$request->get_json_params(),
array(
'survey_id' => sanitize_text_field($survey_id),

'user_ip' => $id_address,

'user_browser' => $browser,

'user_os' => $os,

'user_device' => $device,
)
)
);

do_action('userfeedback_survey_response', $survey_id, $response_id, $request->get_json_params());

return new WP_REST_Response(
array(
'success' => true,
'response_id' => $response_id,
)
);

}

When a user or visitor submits their feedback, the code will run the function save_survey_response() and capture the submission from the visitor/user with the function $request->get_json_params(). After that, the code will call the create() function from the class UserFeedback_Response. See the code below..

  • Filename: wp-content/plugins/userfeedback-lite/includes/db/class-userfeedback-db.php
  • Code:
public static function create( $args, $new_timestamps = true ) {
global $wpdb;

$instance = new static();// self::get_instance();
$table = $instance->get_table();

foreach ( $args as $key => $value ) {

if ( ! in_array( $key, $instance->get_columns() ) ) {
unset( $args[ $key ] );
}
}

$params = $args;
if ( $new_timestamps ) {
$params = array_merge(
$params,
array(
$instance->timestamp_column => current_time( 'mysql' ),
)
);
}

$params = $instance->encode_entity_attributes( $params );

$wpdb->insert( $table, $params );
return $wpdb->insert_id;

}

If we look at the code above, the create() function will process the input from the visitor to the database with the $wpdb->insert(). However during this process, the input from the visitor is not filtered, so the visitor can send malicious code/scripts.

PATCH

This vulnerability has been patched on version 1.0.8, before the submitted text from users/visitor is saved to database, it will be sanitized using sanitize_text_field()

Sanitize User Input

Attack Scenario

1. Install wordpress and run on your local server. Then install UserFeedback <= 1.0.7 Plugin

2. Setup New Surveys with Long Answer question type.

Setup new Surveys/Feedback

3. Logout from admin account.

4. Open home page and click a Post.

5. Fill the feedback form with XSS payload and click submit. We can submit survey as Visitor/Guest.

Payload:

<img src=x onerror=”alert(document.cookie)” />
Feeback form

6. Login with admin account and check the results page -> click surveys -> individual response.

Results Page
Individual Response Button

7. Alert popup will be shown

Stored XSS

Timeline

  • 09 August, 2023: Reported to Patchstack
  • 14 August, 2023: Vulnerability Fixed
  • 04 September, 2023: Publicly Disclosed

Support

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Revan A

IT Security Analyst | Red Team | Security Researcher

No responses yet

Write a response