WordPress WHOIS Plugin 'domain' Parameter Cross Site Scripting Vulnerability
BID:51244
Info
WordPress WHOIS Plugin 'domain' Parameter Cross Site Scripting Vulnerability
| Bugtraq ID: | 51244 |
| Class: | Input Validation Error |
| CVE: |
CVE-2011-5194 |
| Remote: | Yes |
| Local: | No |
| Published: | Jan 03 2012 12:00AM |
| Updated: | Sep 25 2012 02:00PM |
| Credit: | Atmon3r |
| Vulnerable: |
WordPress WHOIS 1.4.2 3 |
| Not Vulnerable: | |
Discussion
WordPress WHOIS Plugin 'domain' Parameter Cross Site Scripting Vulnerability
WHOIS for WordPress is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
WHOIS 1.4.2.3 is vulnerable; other versions may also be affected.
WHOIS for WordPress is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
WHOIS 1.4.2.3 is vulnerable; other versions may also be affected.
Solution / Fix
WordPress WHOIS Plugin 'domain' Parameter Cross Site Scripting Vulnerability
Solution:
Updates are available. Please see the references for more information.
Solution:
Updates are available. Please see the references for more information.
References
WordPress WHOIS Plugin 'domain' Parameter Cross Site Scripting Vulnerability
References:
References:
- WHOIS Download Page (WordPress)
- WHOIS v1.4.2.3 with an XSS vulnerability fix and other small improvements. (WordPress)