Hello,
1. Reflected Cross-Site Scripting (XSS)
Authenticated administrators can inject html/js code (there is no CSRF protection!).
Method: POST
Vulnerable parameters: licensekey
Example PHP callstack:
OnpLicensing325_LicenseManagerPage::indexAction /social-locker/bizpanda/libs/onepress/licensing/includes/license-manager.class.php:334]
Verification:
--
<input type="text" name="licensekey" value='"><img src=x onerror=alert(1) />' />
<input type="submit" name="submit" />
</form>
--
2. Reflected Cross-Site Scripting (XSS)
Authenticated administrators can inject html/js code (there is no CSRF protection!).
Method: GET
Vulnerable parameters: opanda_status
Example PHP callstack:
OPanda_LeadsListTable::search_box [/social-locker/bizpanda/admin/includes/classes/class.leads.table.php:78]
Verification:
--
Regards,
Marcin Probola,