WordPress Easy Post Types Plugin 'classes/custom-image/media.php' Cross Site Scripting Vulnerability
BID:69210
Info
WordPress Easy Post Types Plugin 'classes/custom-image/media.php' Cross Site Scripting Vulnerability
| Bugtraq ID: | 69210 |
| Class: | Input Validation Error |
| CVE: |
CVE-2014-4524 |
| Remote: | Yes |
| Local: | No |
| Published: | May 28 2014 12:00AM |
| Updated: | May 28 2014 12:00AM |
| Credit: | Prajal Kulkarni |
| Vulnerable: |
WordPress Easy Post Types 1.4.3 |
| Not Vulnerable: |
WordPress Easy Post Types 1.4.4 |
Discussion
WordPress Easy Post Types Plugin 'classes/custom-image/media.php' Cross Site Scripting Vulnerability
The Easy Post Types plugin for WordPress is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
Versions prior to Easy Post Types 1.4.4 are vulnerable.
The Easy Post Types plugin for WordPress is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
Versions prior to Easy Post Types 1.4.4 are vulnerable.
Exploit / POC
WordPress Easy Post Types Plugin 'classes/custom-image/media.php' Cross Site Scripting Vulnerability
To exploit this issue an attacker must entice an unsuspecting victim to follow a malicious URI.
The following example URI is available:
http://www.example.com/wordpress/wp-content/wp-plugs/easy-post-types/classes/custom-image/media.php?ref=ref%22%3C/script%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&#
To exploit this issue an attacker must entice an unsuspecting victim to follow a malicious URI.
The following example URI is available:
http://www.example.com/wordpress/wp-content/wp-plugs/easy-post-types/classes/custom-image/media.php?ref=ref%22%3C/script%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&#
Solution / Fix
WordPress Easy Post Types Plugin 'classes/custom-image/media.php' Cross Site Scripting Vulnerability
Solution:
Updates are available. Please see the references or vendor advisory for more information.
Solution:
Updates are available. Please see the references or vendor advisory for more information.