lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Mon, 2 Jul 2012 21:45:30 +0300
From: "MustLive" <mustlive@...security.com.ua>
To: <submissions@...ketstormsecurity.org>, <full-disclosure@...ts.grok.org.uk>
Subject: XSS,
	Redirector and FPD vulnerabilities in WordPress

Hello list!

In June I've disclosed vulnerabilities in WordPress, which I'd present for 
you. They take place in plugin Akismet for WordPress and it's core-plugin 
(since version WP 2.0), so these vulnerabilities concern WordPress itself. 
This is the first in series of advisories concerning vulnerabilities in 
Akismet.

These are Cross-Site Scripting, Redirector and Full path disclosure 
vulnerabilities.

-------------------------
Affected products:
-------------------------

Vulnerable are Akismet 2.5.6 and previous versions and WordPress 2.0 - 
3.4.1. Akismet 2.5.6 is bundled with the last versions 3.4 and 3.4.1 of 
WordPress.

----------
Details:
----------

XSS (WASC-08):

At GET request to script 
http://site/wp-admin/edit.php?page=akismet-admin&recheckqueue=1 or 
http://site/wp-admin/edit-comments.php?page=akismet-admin&recheckqueue=1 or 
http://site/wp-admin/admin.php?action=akismet_recheck_queue (depending on 
version, in WP 3.x the last address is used).

With setting of Referer header. This can be done via Flash or other methods. 
Last year I've wrote the article XSS attacks via User-Agent header 
(http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2011-June/007909.html) 
and almost all of these methods can be used for Referer header.

Referer: 
data:text/html;base64,PHNjcmlwdD5hbGVydChkb2N1bWVudC5jb29raWUpPC9zY3JpcHQ+

At IIS web servers the redirect is going via Refresh header, and at other 
web servers - via Location header.

Redirector (URL Redirector Abuse) (WASC-38):

At GET request to script 
http://site/wp-admin/edit.php?page=akismet-admin&recheckqueue=1 or 
http://site/wp-admin/edit-comments.php?page=akismet-admin&recheckqueue=1 or 
http://site/wp-admin/admin.php?action=akismet_recheck_queue (depending on 
version, in WP 3.x the last address is used).

With setting of Referer header. This can be done via Flash or other methods.

Referer: http://attackers_site

In WP <= 2.0.11 (Akismet <= 2.0.2) via error in the plugin the XSS and 
Redirector attacks don't work, but they do work with newer versions of the 
plugin in different versions of WordPress (before 3.4).

At that in the last version Akismet 2.5.6 (which bundled with WP 3.4 and 
3.4.1) these two vulnerabilities are fixed already (at that hiddenly, 
without any mentioning in readme.txt of the plugin or in announcements of 
WP). It looks like it has happened after my March or April advisory about 
XSS and Redirector vulnerabilities via redirectors in WP.

Full path disclosure (WASC-13):

Via above-mentioned error in the plugin the XSS and Redirector attacks don't 
work, but has place FPD at request to script (in old versions of Akismet, 
such as 2.0.2).

http://site/wp-admin/edit.php?page=akismet-admin&recheckqueue=1 or 
http://site/wp-admin/edit-comments.php?page=akismet-admin&recheckqueue=1 
(depending on version of WP).

Full path disclosure (WASC-13):

If previous FPD has place in the account, then these FPD don't require 
authorization.

http://site/wp-content/plugins/akismet/admin.php

http://site/wp-content/plugins/akismet/akismet.php

http://site/wp-content/plugins/akismet/legacy.php

http://site/wp-content/plugins/akismet/widget.php

------------
Timeline:
------------

2012.02.23 - found vulnerabilities in Akismet 2.5.3. Later tested in other 
versions of the plugin from different versions of WordPress.
2012.06.29 - disclosed at my site (http://websecurity.com.ua/5933/).

Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua 


_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ