lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <39832213-c48a-9ed2-96c2-223bce2d2065@defensecode.com> Date: Tue, 11 Apr 2017 13:39:34 +0200 From: DefenseCode <defensecode@...ensecode.com> To: fulldisclosure@...lists.org Subject: [FD] DefenseCode ThunderScan SAST Advisory: WordPress Tribulant Slideshow Gallery Plugin - Cross-Site Scripting Vulnerabilities DefenseCode ThunderScan SAST Advisory WordPress Tribulant Slideshow Gallery Plugin - Cross-Site Scripting Vulnerabilities Advisory ID: DC-2017-01-014 Software: WordPress Tribulant Slideshow Gallery plugin Software Language: PHP Version: 1.6.4 and below Vendor Status: Vendor contacted, fix released Release Date: 20170410 Risk: Medium # Brief Vulnerability Description During the security analysis, ThunderScan discovered multiple Cross-Site Scripting vulnerabilities in Tribulant Slideshow Gallery WordPress Plugin. The easiest way to reproduce the vulnerability is to visit the provided URL while being logged in as administrator or another user that is authorized to access the plugin settings page. The Cross-Site Scripting vulnerability can enable the attacker to construct the URL that contains malicious JavaScript code. If the administrator of the site makes a request to such an URL, the attacker's code will be executed, with unrestricted access to the WordPress site in question. The attacker can entice the administrator to visit the URL in various ways, including sending the URL by email, posting it as a part of the comment on the vulnerable site or another forum, or embedding it as an IMG tag source in another web page administrator will visit, causing the administrator's browser to request the URL automatically - due to missing nonce token the vulnerability is directly exposed to Cross site request forgery, (CSRF) attacks. The JavaScript code could enable the attacker to make requests with administrator privileges, or grab the session ID and be able to interact with the administrative pages through his own browser. Full advisory available on the following URL: http://www.defensecode.com/advisories/DC-2017-01-014_WordPress_Tribulant_Slideshow_Gallery_Plugin_Advisory.pdf # About DefenseCode DefenseCode L.L.C. delivers products and services designed to analyze and test web, desktop and mobile applications for security vulnerabilities. DefenseCode ThunderScan is a SAST (Static Application Security Testing, WhiteBox Testing) solution for performing extensive security audits of application sourcecode. ThunderScan performs fast and accurate analyses of large and complex source code projects delivering precise results and low false positive rate. DefenseCode WebScanner is a DAST (Dynamic Application Security Testing, BlackBox Testing) solution for comprehensive security audits of active web applications. WebScanner will test a website's security by carrying out a large number of attacks using the most advanced techniques, just as a real attacker would. Subscribe for free software trial on our website http://www.defensecode.com/ E-mail: defensecode[at]defensecode.com Website: http://www.defensecode.com/ Twitter: https://twitter.com/DefenseCode/ _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists