WordPress WPsc MijnPress Plugin 'rwflush' Parameter Cross Site Scripting Vulnerability
BID:53302
Info
WordPress WPsc MijnPress Plugin 'rwflush' Parameter Cross Site Scripting Vulnerability
| Bugtraq ID: | 53302 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 30 2012 12:00AM |
| Updated: | Apr 30 2012 12:00AM |
| Credit: | Am!r |
| Vulnerable: |
WordPress WPsc MijnPress 0 |
| Not Vulnerable: | |
Discussion
WordPress WPsc MijnPress Plugin 'rwflush' Parameter Cross Site Scripting Vulnerability
The WPsc MijnPress for WordPress is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
The WPsc MijnPress for WordPress is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
Exploit / POC
WordPress WPsc MijnPress Plugin 'rwflush' Parameter Cross Site Scripting Vulnerability
Attackers can exploit this issue by enticing an unsuspecting victim to follow a malicious URI.
The following example URI is available:
http://www.example.com/wp-content/plugins/wp-content/plugins/wpsc-mijnpress/mijnpress_plugin_framework.php?rwflush=[xss]
Attackers can exploit this issue by enticing an unsuspecting victim to follow a malicious URI.
The following example URI is available:
http://www.example.com/wp-content/plugins/wp-content/plugins/wpsc-mijnpress/mijnpress_plugin_framework.php?rwflush=[xss]