[<prev] [next>] [day] [month] [year] [list]
Message-ID: <95435f69-5fb9-1746-438b-21e7bb976897@securify.nl>
Date: Mon, 15 Aug 2016 18:21:45 +0200
From: Summer of Pwnage <lists@...urify.nl>
To: fulldisclosure@...lists.org
Subject: [FD] Cross-Site Scripting in Link Library WordPress Plugin
------------------------------------------------------------------------
Cross-Site Scripting in Link Library WordPress Plugin
------------------------------------------------------------------------
Burak Kelebek, July 2016
------------------------------------------------------------------------
Abstract
------------------------------------------------------------------------
A Reflected Cross-Site Scripting (XSS) vulnerability has been found in
the Link Library plugin. By using this vulnerability an attacker can
inject malicious JavaScript code into the application, which will
execute within the browser of any logged-in admin.
------------------------------------------------------------------------
OVE ID
------------------------------------------------------------------------
OVE-20160724-0016
------------------------------------------------------------------------
Tested versions
------------------------------------------------------------------------
This issue was successfully tested on Link Library version 5.9.12.29.
------------------------------------------------------------------------
Fix
------------------------------------------------------------------------
This issue is fixed in version 5.9.12.30
------------------------------------------------------------------------
Details
------------------------------------------------------------------------
https://sumofpwn.nl/advisory/2016/cross_site_scripting_in_link_library_wordpress_plugin.html
------------------------------------------------------------------------
Summer of Pwnage (https://sumofpwn.nl) is a Dutch community project. Its
goal is to contribute to the security of popular, widely used OSS
projects in a fun and educational way.
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists