Cyber Security Works has discovered a new zero-day (Cross-Site Scripting) vulnerability, CVE-2021-33850 in WordPress Microsoft Clarity. Microsoft Clarity is an open source analytics tool for websites to track how users interact with your website and the most popular pages. This vulnerability was uncovered by CSW researchers on October 17, 2021.
This clearly demonstrates why cybersecurity professionals have high concern when it comes to Cross-Site Scripting (XSS) vulnerabilities. Therefore, CSW researchers were able to find one such vulnerability in Microsoft Clarity version 0.3.
Description
The Microsoft Clarity version 0.3 is vulnerable to a Cross-Site Scripting vulnerability which allows arbitrary code to run in a web browser while the browser is connected to a user’s trusted site. An XSS attack is carried out every time a user changes the clarity configuration in Microsoft Clarity version 0.3 stored on the configuring project ID page.
Vulnerability at a Glance
Timeline
Proof-of-Concept
The following vulnerability was detected in WordPress Microsoft Clarity Plugin version 0.3.
Issue: Cross-Site Scripting
Severity: Medium
- Log in to the WordPress application.
- Install Microsoft Clarity plugin to your WordPress application.
- Click on Settings, and the Clarity Setting page appears.
- In the Clarity Settings page, enter the payload in the ‘project ID’ section (clarity_project_id parameter).
- Injected XSS payload gets executed whenever the user changes the clarity configuration page.
Impact
An attacker can control a script executed in the victim’s browser and fully compromise the targeted user. In addition, an XSS vulnerability enables attacks that are contained within the application itself. There is no need to find an external way of inducing the victim to make a request containing their exploit. Instead, the attacker places the exploit inside the application itself and simply waits for users to encounter it, thus, resulting in the following—
- Stealing cookies,
- End-user files disclosure,
- Installation of Trojan horse programs,
- Redirection of the user to some other page or site.
Remediation
- Perform context-sensitive encoding of untrusted input before it is echoed back to a browser by using the encoding library.
- Implement input validation for special characters on all the variables reflected in the browser and stored in the database.
- Implement client-side validation.Discovered byCyber Security Works Pvt. Ltd.Vendor AdvisorySecurity Advisory Published by WordPress Contribution Credits: Praveen Thiyagarayam, Sathish Kumar, and Arjun Basnet