Files
CVEs-PoC/2021/CVE-2021-24320.md
T
2024-06-18 02:51:15 +02:00

20 lines
1.2 KiB
Markdown

### [CVE-2021-24320](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24320)
![](https://img.shields.io/static/v1?label=Product&message=Bello%20-%20Directory%20%26%20Listing&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.6.0%3C%201.6.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-site%20Scripting%20(XSS)&color=brighgreen)
### Description
The Bello - Directory & Listing WordPress theme before 1.6.0 did not properly sanitise and escape its listing_list_view, bt_bb_listing_field_my_lat, bt_bb_listing_field_my_lng, bt_bb_listing_field_distance_value, bt_bb_listing_field_my_lat_default, bt_bb_listing_field_keyword, bt_bb_listing_field_location_autocomplete, bt_bb_listing_field_price_range_from and bt_bb_listing_field_price_range_to parameter in ints listing page, leading to reflected Cross-Site Scripting issues.
### POC
#### Reference
- https://m0ze.ru/vulnerability/%5B2021-03-21%5D-%5BWordPress%5D-%5BCWE-79%5D-Bello-WordPress-Theme-v1.5.9.txt
- https://wpscan.com/vulnerability/6b5b42fd-028a-4405-b027-3266058029bb
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates