lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <39832213-c48a-9ed2-96c2-223bce2d2065@defensecode.com>
Date: Tue, 11 Apr 2017 13:39:34 +0200
From: DefenseCode <defensecode@...ensecode.com>
To: fulldisclosure@...lists.org
Subject: [FD] DefenseCode ThunderScan SAST Advisory: WordPress Tribulant
 Slideshow Gallery Plugin - Cross-Site Scripting Vulnerabilities



           DefenseCode ThunderScan SAST Advisory
WordPress Tribulant Slideshow Gallery Plugin - Cross-Site Scripting
Vulnerabilities


Advisory ID: DC-2017-01-014
Software: WordPress Tribulant Slideshow Gallery plugin
Software Language: PHP
Version: 1.6.4 and below
Vendor Status: Vendor contacted, fix released
Release Date: 20170410
Risk: Medium


# Brief Vulnerability Description

During the security analysis, ThunderScan discovered multiple Cross-Site Scripting
vulnerabilities in Tribulant Slideshow Gallery WordPress Plugin. The easiest way to reproduce
the vulnerability is to visit the provided URL while being logged in as administrator or another
user that is authorized to access the plugin settings page.

The Cross-Site Scripting vulnerability can enable the attacker to construct the URL that
contains malicious JavaScript code. If the administrator of the site makes a request to such an
URL, the attacker's code will be executed, with unrestricted access to the WordPress site in
question. The attacker can entice the administrator to visit the URL in various ways, including
sending the URL by email, posting it as a part of the comment on the vulnerable site or another
forum, or embedding it as an IMG tag source in another web page administrator will visit,
causing the administrator's browser to request the URL automatically - due to missing nonce
token the vulnerability is directly exposed to Cross site request forgery, (CSRF) attacks.
The JavaScript code could enable the attacker to make requests with administrator privileges,
or grab the session ID and be able to interact with the administrative pages through his own
browser.


Full advisory available on the following URL:
http://www.defensecode.com/advisories/DC-2017-01-014_WordPress_Tribulant_Slideshow_Gallery_Plugin_Advisory.pdf


# About DefenseCode

DefenseCode L.L.C. delivers products and services designed to analyze
and test web, desktop and mobile applications for security vulnerabilities.

DefenseCode ThunderScan is a SAST (Static Application Security Testing,
WhiteBox Testing) solution for performing extensive security audits of
application sourcecode.
ThunderScan performs fast and accurate analyses of large and complex
source code projects delivering precise results and low false positive
rate.

DefenseCode WebScanner is a DAST (Dynamic Application Security Testing,
BlackBox Testing) solution for comprehensive security audits of active
web applications.
WebScanner will test a website's security by carrying out a large number
of attacks using the most advanced techniques, just as a real attacker
would.

Subscribe for free software trial on our website
http://www.defensecode.com/

E-mail: defensecode[at]defensecode.com

Website: http://www.defensecode.com/
Twitter: https://twitter.com/DefenseCode/


_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ