[<prev] [next>] [day] [month] [year] [list]
Message-ID: <00b501cd5883$6a7ba2e0$9b7a6fd5@ml>
Date: Mon, 2 Jul 2012 21:45:30 +0300
From: "MustLive" <mustlive@...security.com.ua>
To: <submissions@...ketstormsecurity.org>, <full-disclosure@...ts.grok.org.uk>
Subject: XSS,
Redirector and FPD vulnerabilities in WordPress
Hello list!
In June I've disclosed vulnerabilities in WordPress, which I'd present for
you. They take place in plugin Akismet for WordPress and it's core-plugin
(since version WP 2.0), so these vulnerabilities concern WordPress itself.
This is the first in series of advisories concerning vulnerabilities in
Akismet.
These are Cross-Site Scripting, Redirector and Full path disclosure
vulnerabilities.
-------------------------
Affected products:
-------------------------
Vulnerable are Akismet 2.5.6 and previous versions and WordPress 2.0 -
3.4.1. Akismet 2.5.6 is bundled with the last versions 3.4 and 3.4.1 of
WordPress.
----------
Details:
----------
XSS (WASC-08):
At GET request to script
http://site/wp-admin/edit.php?page=akismet-admin&recheckqueue=1 or
http://site/wp-admin/edit-comments.php?page=akismet-admin&recheckqueue=1 or
http://site/wp-admin/admin.php?action=akismet_recheck_queue (depending on
version, in WP 3.x the last address is used).
With setting of Referer header. This can be done via Flash or other methods.
Last year I've wrote the article XSS attacks via User-Agent header
(http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2011-June/007909.html)
and almost all of these methods can be used for Referer header.
Referer:
data:text/html;base64,PHNjcmlwdD5hbGVydChkb2N1bWVudC5jb29raWUpPC9zY3JpcHQ+
At IIS web servers the redirect is going via Refresh header, and at other
web servers - via Location header.
Redirector (URL Redirector Abuse) (WASC-38):
At GET request to script
http://site/wp-admin/edit.php?page=akismet-admin&recheckqueue=1 or
http://site/wp-admin/edit-comments.php?page=akismet-admin&recheckqueue=1 or
http://site/wp-admin/admin.php?action=akismet_recheck_queue (depending on
version, in WP 3.x the last address is used).
With setting of Referer header. This can be done via Flash or other methods.
Referer: http://attackers_site
In WP <= 2.0.11 (Akismet <= 2.0.2) via error in the plugin the XSS and
Redirector attacks don't work, but they do work with newer versions of the
plugin in different versions of WordPress (before 3.4).
At that in the last version Akismet 2.5.6 (which bundled with WP 3.4 and
3.4.1) these two vulnerabilities are fixed already (at that hiddenly,
without any mentioning in readme.txt of the plugin or in announcements of
WP). It looks like it has happened after my March or April advisory about
XSS and Redirector vulnerabilities via redirectors in WP.
Full path disclosure (WASC-13):
Via above-mentioned error in the plugin the XSS and Redirector attacks don't
work, but has place FPD at request to script (in old versions of Akismet,
such as 2.0.2).
http://site/wp-admin/edit.php?page=akismet-admin&recheckqueue=1 or
http://site/wp-admin/edit-comments.php?page=akismet-admin&recheckqueue=1
(depending on version of WP).
Full path disclosure (WASC-13):
If previous FPD has place in the account, then these FPD don't require
authorization.
http://site/wp-content/plugins/akismet/admin.php
http://site/wp-content/plugins/akismet/akismet.php
http://site/wp-content/plugins/akismet/legacy.php
http://site/wp-content/plugins/akismet/widget.php
------------
Timeline:
------------
2012.02.23 - found vulnerabilities in Akismet 2.5.3. Later tested in other
versions of the plugin from different versions of WordPress.
2012.06.29 - disclosed at my site (http://websecurity.com.ua/5933/).
Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists