Project: Wordpress Plugin 3.0.34

Vulnerability: #16 (2017-04-19 10:41:26)

Warning

There are many false positives, or unexploitable vulnerabilities. Please create working "PoC" exploit before reporting anything to vendor!

Details:

Sink Standard::setcookie
Risk _COOKIE
/ninja-forms/includes/Libraries/Session/class-wp-session.php:83 (show/hide source)
63       * @return bool|WP_Session
64       */
65      public static function get_instance() {
66          if ( ! self::$instance ) {
67              self::$instance = new self();
68          }
69  
70          return self::$instance;
71      }
72  
73      /**
74       * Default constructor.
75       * Will rebuild the session collection from the given session ID if it exists. Otherwise, will
76       * create a new session with that ID.
77       *
78       * @param $session_id
79       * @uses apply_filters Calls `wp_session_expiration` to determine how long until sessions expire.
80       */
81      protected function __construct() {
82          if ( isset( $_COOKIE[WP_SESSION_COOKIE] ) ) {
83 $cookie = stripslashes( $_COOKIE[WP_SESSION_COOKIE] );
84 $cookie_crumbs = explode( '||', $cookie ); 85
Threat level 1

Callstack: