[prev in list] [next in list] [prev in thread] [next in thread]
List: oss-security
Subject: [oss-security] CVE request: persistent XSS in Wordpress Plugin NewStatPress v.1.0.3
From: Responsive Disclosure | HSASec <disclosure () hsasec ! de>
Date: 2015-06-30 19:05:42
Message-ID: 5592E886.5090208 () hsasec ! de
[Download RAW message or body]
OpenWallInfo
============
Created Tuesday 30 June 2015
Dear Sir or Mam,
we want to inform you about a security vulnerability in one of the
plugins provided by you or one member of your company.
Please regard the information below.
Plugin:
NewStatPress (https://wordpress.org/plugins/newstatpress/)
Product-Type:
Wordpress-Plugin
Version:
1.0.3
Vendor:
ice00 (http://newstatpress.altervista.org/?page_id=2)
Fixed:
reported: 2015-06-30
fixed in version 1.04, 2015-06-30
Changelog:
https://wordpress.org/plugins/newstatpress/changelog/
Type of vulnerability:
persistent XSS via HTTP-Header (Referer) (no authentication required)
Description:
An unsifficent user input validation (of HTTP-Header: Referer) results
in a persistent XSS in the wordpress admin-panel. So an attacker may be
able to access any cookies, session tokens or other sensitive
information retained by the browser and used with that site.
Proof of Concept:
yes (internal)
Researchers:
* Michael Kapfer (Michael.Kapfer@hs-augsburg.de)
Best regards,
HSASec-Team (https://www.HSASec.de)
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic