The Popular WooCommerce Booster plugin patched a Reflected Cross-Site Scripting vulnerability, affecting as much as 70,000+ sites utilizing the plugin.
Booster for WooCommerce Vulnerability
Booster for WooCommerce is a popular all-in-one WordPress plugin that uses over 100 functions for tailoring WooCommerce shops.
The modular package uses all of the most essential performances essential to run an ecommerce shop such as a custom payment entrances, shopping cart modification, and customized price labels and buttons.
Shown Cross Website Scripting (XSS)
A showed cross-site scripting vulnerability on WordPress typically takes place when an input anticipates something specific (like an image upload or text) however enables other inputs, consisting of malicious scripts.
An assaulter can then perform scripts on a website visitor’s web browser.
If the user is an admin then there can be a potential for the enemy taking the admin credentials and taking control of the site.
The non-profit Open Web Application Security Task (OWASP) explains this type of vulnerability:
“Reflected attacks are those where the injected script is shown off the web server, such as in an error message, search engine result, or any other response that includes some or all of the input sent out to the server as part of the demand.
Reflected attacks are delivered to victims via another path, such as in an e-mail message, or on some other website.
… XSS can trigger a range of problems for the end user that range in severity from an annoyance to finish account compromise.”
Since this time the vulnerability has actually not been designated an intensity ranking.
This is the main description of the vulnerability by the U.S. Federal Government National Vulnerability Database:
“The Booster for WooCommerce WordPress plugin before 5.6.3, Booster Plus for WooCommerce WordPress plugin before 6.0.0, Booster Elite for WooCommerce WordPress plugin prior to 6.0.0 do not leave some URLs and parameters before outputting them back in qualities, causing Reflected Cross-Site Scripting.”
What that means is that the vulnerability involves a failure to “escape some URLs,” which suggests to encode them in unique characters (called ASCII).
Escaping URLs implies encoding URLs in an expected format. So if a URL with a blank area is experienced a site might encoded that URL utilizing the ASCII characters “%20” to represent the encoded blank space.
It’s this failure to appropriately encode URLs which enables an assailant to input something else, presumably a harmful script although it might be something else like a redirection to harmful website.
Changelog Records Vulnerabilities
The plugins main log of software updates (called a Changelog) makes reference to a Cross Site Request Forgery vulnerability.
The free Booster for WooCommerce plugin changelog consists of the following notation for version 6.0.1:
“FIXED– EMAILS & MISC.– General– Fixed CSRF problem for Booster User Roles Changer.
REPAIRED– Added Security vulnerability repairs.”
Users of the plugin ought to think about upgrading to the extremely newest version of the plugin.
Read the advisory at the U.S. Federal Government National Vulnerability Database
Check out a summary of the vulnerability at the WPScan website
Booster for WooCommerce– Shown Cross-Site Scripting
Included image by Best SMM Panel/Asier Romero