[<prev] [next>] [day] [month] [year] [list]
Message-ID: <991c1940-f162-52f7-65cf-c62c08d0c5a2@securify.nl>
Date: Tue, 8 Nov 2016 11:19:51 +0100
From: Summer of Pwnage <lists@...urify.nl>
To: fulldisclosure@...lists.org
Subject: [FD] Cross-Site Scripting in Calendar WordPress Plugin
------------------------------------------------------------------------
Cross-Site Scripting in Calendar WordPress Plugin
------------------------------------------------------------------------
Remco Vermeulen, July 2016
------------------------------------------------------------------------
Abstract
------------------------------------------------------------------------
A Cross-Site Scripting vulnerability was found in the Calendar WordPress
Plugin. This issue allows an attacker to perform a wide variety of
actions, such as stealing Administrators' session tokens, or performing
arbitrary actions on their behalf. In order to exploit this issue, the
attacker has to lure/force a logged on WordPress Administrator into
opening a malicious website.
------------------------------------------------------------------------
OVE ID
------------------------------------------------------------------------
OVE-20160725-0008
------------------------------------------------------------------------
Tested versions
------------------------------------------------------------------------
This issue was successfully tested on Calendar WordPress Plugin version
1.3.7.
------------------------------------------------------------------------
Fix
------------------------------------------------------------------------
This issue is resolved in Calendar version 1.3.8.
------------------------------------------------------------------------
Details
------------------------------------------------------------------------
https://sumofpwn.nl/advisory/2016/cross_site_scripting_in_calendar_wordpress_plugin.html
------------------------------------------------------------------------
Summer of Pwnage (https://sumofpwn.nl) is a Dutch community project. Its
goal is to contribute to the security of popular, widely used OSS
projects in a fun and educational way.
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists