WordPress GarageSale Plugin 'printAdminUsersList_Footer.tpl.php' Cross Site Scripting Vulnerability
BID:69502
Info
WordPress GarageSale Plugin 'printAdminUsersList_Footer.tpl.php' Cross Site Scripting Vulnerability
| Bugtraq ID: | 69502 |
| Class: | Input Validation Error |
| CVE: |
CVE-2014-4532 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 25 2014 12:00AM |
| Updated: | Apr 25 2014 12:00AM |
| Credit: | Prajal Kulkarni |
| Vulnerable: |
Garagesale_project Garagesale 1.2.2 |
| Not Vulnerable: |
Garagesale_project Garagesale 1.2.3 |
Discussion
WordPress GarageSale Plugin 'printAdminUsersList_Footer.tpl.php' Cross Site Scripting Vulnerability
The GarageSale plugin for WordPress is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
GarageSale 1.2.2 is vulnerable; other versions may also be affected.
The GarageSale plugin for WordPress is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input.
An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
GarageSale 1.2.2 is vulnerable; other versions may also be affected.
Exploit / POC
WordPress GarageSale Plugin 'printAdminUsersList_Footer.tpl.php' Cross Site Scripting Vulnerability
To exploit this issue an attacker must entice an unsuspecting victim to follow a malicious URI.
The following example URI is available:
http://www.example.com/wordpress/wp-content/wp-plugs/garagesale/templates/printAdminUsersList_Footer.tpl.php?page=page%22%3C/script%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&
To exploit this issue an attacker must entice an unsuspecting victim to follow a malicious URI.
The following example URI is available:
http://www.example.com/wordpress/wp-content/wp-plugs/garagesale/templates/printAdminUsersList_Footer.tpl.php?page=page%22%3C/script%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&
References
WordPress GarageSale Plugin 'printAdminUsersList_Footer.tpl.php' Cross Site Scripting Vulnerability
References:
References:
- Garagesale changelog 1.2.3 (WordPress)
- WordPress HomePage (WordPress)
- wp-plugin : garagesale �?? A3-Cross-Site Scripting (XSS) (CodeVigilant)