[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    [oss-security] CVE request: persistent XSS in Wordpress Plugin NewStatPress v.1.0.3
From:       Responsive Disclosure | HSASec <disclosure () hsasec ! de>
Date:       2015-06-30 19:05:42
Message-ID: 5592E886.5090208 () hsasec ! de
[Download RAW message or body]

OpenWallInfo
============
Created Tuesday 30 June 2015

Dear Sir or Mam,

we want to inform you about a security vulnerability in one of the
plugins provided by you or one member of your company.
Please regard the information below.

Plugin:
NewStatPress (https://wordpress.org/plugins/newstatpress/)

Product-Type:
Wordpress-Plugin

Version:
1.0.3

Vendor:         
ice00 (http://newstatpress.altervista.org/?page_id=2)

Fixed:             
reported: 2015-06-30
fixed in version 1.04, 2015-06-30

Changelog:         
https://wordpress.org/plugins/newstatpress/changelog/


Type of vulnerability:
persistent XSS via HTTP-Header (Referer) (no authentication required)

Description:  
An unsifficent user input validation (of HTTP-Header: Referer) results
in a persistent XSS in the wordpress admin-panel. So an attacker may be
able to access any cookies, session tokens or other sensitive
information retained by the browser and used with that site.  

Proof of Concept:
yes (internal)

Researchers:
* Michael Kapfer (Michael.Kapfer@hs-augsburg.de)

Best regards,
HSASec-Team (https://www.HSASec.de)

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic