WordPress Comment Rating Plugin 'path' Parameter Cross Site Scripting Vulnerability
BID:51241
Info
WordPress Comment Rating Plugin 'path' Parameter Cross Site Scripting Vulnerability
| Bugtraq ID: | 51241 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Jan 03 2012 12:00AM |
| Updated: | Jan 03 2012 12:00AM |
| Credit: | The Evil Thinker |
| Vulnerable: |
WordPress Comment Rating 2.9.20 |
| Not Vulnerable: | |
Discussion
WordPress Comment Rating Plugin 'path' Parameter Cross Site Scripting Vulnerability
The Comment Rating plugin for WordPress is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input.
An attacker could leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could allow the attacker to steal cookie-based authentication credentials and launch other attacks.
The Comment Rating plugin for WordPress is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input.
An attacker could leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This could allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Exploit / POC
WordPress Comment Rating Plugin 'path' Parameter Cross Site Scripting Vulnerability
The attacker must entice an unsuspecting victim to follow a malicious URI in order to exploit this issue.
The following example URI is available:
http://www.example.com/wp-content/plugins/comment-rating/ck-processkarma.php?id=[Integer Value]&action=add&path=<script>alert('Founded by TheEvilThinker')</script>&imgIndex=
The attacker must entice an unsuspecting victim to follow a malicious URI in order to exploit this issue.
The following example URI is available:
http://www.example.com/wp-content/plugins/comment-rating/ck-processkarma.php?id=[Integer Value]&action=add&path=<script>alert('Founded by TheEvilThinker')</script>&imgIndex=
Solution / Fix
WordPress Comment Rating Plugin 'path' Parameter Cross Site Scripting Vulnerability
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution:
Currently we are not aware of any vendor-supplied patches. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
References
WordPress Comment Rating Plugin 'path' Parameter Cross Site Scripting Vulnerability
References:
References:
- Wordpress Homepage (Wordpress)