lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CALCpQr_112zrdgi-_hEYWZJm-OVpawOdaaQ-Hgmiqbxo6p7W_A@mail.gmail.com> Date: Tue, 15 Mar 2016 13:07:44 +0530 From: Sachin Wagh <wsachin092@...il.com> To: fulldisclosure@...lists.org Subject: [FD] WordPress Bulletproof Security Plugin Multiple Cross Site Scripting Vulnerabilities *Product: Bulletproof SecurityExploit Author: Sachin WaghAffected Version: 0.53.2* *Fixed Version:** 0.53.3 * (http://forum.ait-pro.com/forums/topic/bps-changelog/ <http://forum.ait-pro.com/forums/topic/bps-changelog/>) *Home page Link: https://wordpress.org/plugins/bulletproof-security/ <https://wordpress.org/plugins/bulletproof-security/>* *Detail:* The Bulletproof Security plugin for WordPress is prone to a multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied input. An attacker may leverage this issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. *Vulnerable Product:* [+] Bulletproof Security 0.53.2 *Vulnerable Parameter(s) : * [+] bulletproof_security_options_email[bps_send_email_cc] [+] bulletproof_security_options_email[bps_send_email_bcc] *Affected Area(s): * [+] http://localhost/wordpress-4.4/wordpress/wpadmin/admin.php?page=bulletproof-security%2Fadmin%2Flogin%2Flogin.php *Credit:* Sachin Wagh (@tiger_tigerboy) _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/