[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <7BE8B2EFA7D0DE4F9E31B7F69EA2CF3D02384E57@MAILER.er.ucsd.edu>
Date: Mon, 5 Mar 2007 14:25:07 -0800
From: "McCarty, Eric C." <emccarty@...ucsd.edu>
To: <ciri@...tuax.be>, <bugtraq@...urityfocus.com>
Subject: RE: Wordpress <= v2.1.0
2.0.2 Tested and Does not appear Vulnerable.
-----Original Message-----
From: ciri@...tuax.be [mailto:ciri@...tuax.be]
Sent: Sunday, March 04, 2007 4:56 PM
To: bugtraq@...urityfocus.com
Subject: Wordpress <= v2.1.0
If you're logged in into wordpress as an admin, your comments aren't
properly sanitized, thus allowing an XSS to be posted. This can be
exploited using XSRF techniques.
More info & PoC: http://www.virtuax.be/advisories/Advisory4-20022007.txt
Powered by blists - more mailing lists