Hello,
1. Cross-Site Scripting (XSS) (Reflected)
Authenticated users (like editors) can inject html/js code (there is no CSRF protection).
Method: GET
Vulnerable parameters: playlist, jwp6_playlists_playlist_select
Example PHP callstack:
/jw-player-plugin-for-wordpress/jwp6/jwp6-playlist-manager.php:301
Verification:
There are many other XSS in jwp6-playlist-manager.php, another example:
Method: GET
Vulnerable parameters: order
Example PHP callstack:
/jw-player-plugin-for-wordpress/jwp6/jwp6-playlist-manager.php:365
Verification:
Other possible XSS:
FlashVarState::render [/jw-player-plugin-for-wordpress/admin/FlashVarState.php:87] $_POST['jwplayermodule_value']
AdminState::selectedPlayer [/jw-player-plugin-for-wordpress/admin/AdminState.php:55] $_POST['jwplayermodule_new_player']
PluginState::getFooter [/jw-player-plugin-for-wordpress/admin/PluginState.php:202] $_POST['jwplayermodule_player_plugins']
LTASState::render [/jw-player-plugin-for-wordpress/admin/LTASState.php:93] $_POST['jwplayermodule_plugin_ltas_cc']
PluginState::render [/jw-player-plugin-for-wordpress/admin/PluginState.php:167]
--
Regards,
Marcin Probola,