FooGallery - Reflected cross-site scripting (XSS)
Summary
Name | FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry and Carousel 2.4.16 - Reflected cross-site scripting (XSS) |
Code name | skims-10 |
Product | FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry and Carousel |
Affected versions | Version 2.4.16 |
State | Private |
Release date | 2024-12-06 |
Vulnerability
Kind | Reflected cross-site scripting (XSS) |
Rule | Reflected cross-site scripting (XSS) |
Remote | No |
CVSSv4 Vector | CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:L/VA:L/SC:L/SI:L/SA:L/E:U |
Exploit available | No |
CVE ID(s) | cve-2020-2020 |
Description
FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry and Carousel 2.4.16 was found to be vulnerable. The web application dynamically generates web content without validating the source of the potentially untrusted data in myapp/extensions/albums/admin/class-meta boxes.php.
Vulnerability
Skims by Fluid Attacks discovered a Reflected cross-site scripting (XSS) in FooGallery – Responsive Photo Gallery, Image Viewer, Justified, Masonry and Carousel 2.4.16. The following is the output of the tool:
Skims output
400 | 401 | 402 | 403 | lery_details' ) ) { 404 | 405 | id ); 406 | 407 | 408 | gallery ); ?> 409 | > 410 | ""foogallery_id"" value=""<?php echo $foogallery_id; ?>"" /> 411 | 412 | 413 | s ) { 414 | ld, true ); 415 | lds-' . $field; 416 | 417 | 418 | =""' . $input_id . '"" name=""' . $field . '"" value=""' . esc_attr( foogallery_sanitize_javascript( $value ) ) . '"" />';
419 |
420 |
^ Col 50
Our security policy
We have reserved the ID cve-2020-2020 to refer to this issue from now on.
System Information
- Version: FooGallery – Responsive Photo Gallery,
Image Viewer, Justified, Masonry and Carousel 2.4.16
Mitigation
There is currently no patch available for this vulnerability.
Credits
The vulnerability was discovered by Andres Roldan from Fluid Attacks' Offensive Team using Skims
Timeline
2024-12-06
Vulnerability discovered.
2024-12-06
Vendor contacted.