Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-5114: idbbee.php in idbbee/trunk – WordPress Plugin Repository

The idbbee plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin’s ‘idbbee’ shortcode in versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE
#xss#web#wordpress#php#auth

Last change on this file was 1173546, checked in by , 8 years ago

'Changed

File size: 1.8 KB

Line

1

<?php

2

/*

3

Plugin Name: idbbee

4

Plugin URI: https://wordpress.org/plugins/idbbee/

5

Description: [idbbee src="//thyme.dbbee.com/u/demo/" width="100%" height="600"] shortcode

6

Version: 1.0

7

Author: dbBee.com

8

Author URI: http://www.dbbee.com/

9

License: GPLv3

10

*/

11

12

13

function idbbee_embed_shortcode( $atts, $content = null ) {

14

    $defaults \= array(

15

            'src' \=> '//thyme.dbbee.com/u/demo/',

16

            'width' \=> '100%',

17

            'height' \=> '600',

18

            'id' \=> 'dbBeeIFrame',

19

            'name' \=> 'dbBeeIFrame',

20

            'border' \=> '0',

21

            'frameborder' \=> '0',

22

            'marginwidth' \=> '0',

23

            'marginheight' \=> '0',

24

            'class' \=> 'dbBeeIFrameclass'

25

    );

26

27

    foreach ( $defaults as $default \=> $value ) {

28

            if ( ! @array\_key\_exists( $default, $atts ) ) {

29

                    $atts\[$default\] \= $value;

30

            }

31

    }

32

    $dbbeecode \= "\\n".'<!-- dbBee iframe plugin v.1.0 https://wordpress.org/plugins/idbbee/ -->'."\\n";

33

    $dbbeecode .= '<iframe';

34

    foreach( $atts as $attr \=> $value ) {

35

                    if ( $value != '' ) {

36

                            $dbbeecode .= ' ' . $attr . '="' . $value . '"';

37

                    } else {

38

                            $dbbeecode .= ' ' . $attr;

39

                    }

40

    }

41

    $dbbeecode .= '></iframe>'."\\n";

42

    return $dbbeecode;

43

}

44

add_shortcode( 'idbbee’, ‘idbbee_embed_shortcode’ );

45

function idbbee_plugin_meta( $links, $file ) {

46

    if ( strpos( $file, 'idbbee.php' ) !== false ) {

47

            $links \= array\_merge( $links, array( '<a href="http://www.dbbee.com/" target="\_dbBee" title="dbBee Service">dbBee</a>' ) );

48

            $links \= array\_merge( $links, array( '<a href="https://thyme.dbbee.com/register/" target="\_dbBee" title="Create free account">Register</a>' ) );

49

            $links \= array\_merge( $links, array( '<a href="http://www.dbbee.com/plans" target="\_dbBee" title="See available plans">Plans</a>' ) );

50

    }

51

    return $links;

52

}

53

add_filter( 'plugin_row_meta’, 'idbbee_plugin_meta’, 10, 2 );

Note: See TracBrowser for help on using the repository browser.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907