The Clockwork SMS clockwork-test-message.php component has XSS via a crafted "to" parameter in a clockwork-test-message request to wp-admin/admin.php. This component code is found in the following WordPress plugins: Clockwork Free and Paid SMS Notifications 2.0.3, Two-Factor Authentication - Clockwork SMS 1.0.2, Booking Calendar - Clockwork SMS 1.0.5, Contact Form 7 - Clockwork SMS 2.3.0, Fast Secure Contact Form - Clockwork SMS 2.1.2, Formidable - Clockwork SMS 1.0.2, Gravity Forms - Clockwork SMS 2.2, and WP e-Commerce - Clockwork SMS 2.0.5.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/145469/Clockwork-SMS-Cross-Site-Scripting.html | Exploit Issue Tracking Third Party Advisory VDB Entry |
https://plugins.trac.wordpress.org/changeset/1781424/clockwork-two-factor-authentication/trunk/templates/clockwork-test-message.php?old=706348&old_path=clockwork-two-factor-authentication%2Ftrunk%2Ftemplates%2Fclockwork-test-message.php | Issue Tracking Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2017-12-20 03:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-17780
Mitre link : CVE-2017-17780
CVE.ORG link : CVE-2017-17780
JSON object : View
Products Affected
mediaburst
- booking_calendar_sms
- formidable
- wp_e-commerce
- contact_form_7_sms
- two-factor_authentication
- clockwork_sms_notfications
- gravity_forms
- fast_secure_contact_form_sms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')