comment
IRC Chat
play_arrow
Este sitio utiliza cookies propias y de terceros. Si continúa navegando consideramos que acepta el uso de cookies. OK Más Información.

WordPress Wordfence Firewall 5.1.2 Cross Site Scripting Vulnerability

  • 0 Respuestas
  • 1981 Vistas

0 Usuarios y 3 Visitantes están viendo este tema.

Desconectado Mayk0

  • *
  • Underc0der
  • Mensajes: 126
  • Actividad:
    0%
  • Reputación 0
    • Ver Perfil
    • Hacktivismo Latinoamerica
    • Email
  • Skype: maykozapata
« en: Noviembre 07, 2014, 01:55:54 pm »
WordPress Wordfence Firewall 5.1.2 Cross Site Scripting Vulnerability
Fecha    2014-11-05
Categoria    web applications
Platforma    php
CVE    CVE-2014-4664

================================

Descripcion:
WordPress Wordfence Firewall plugin version 5.1.2 suffers from a cross site scripting vulnerability.


================================

Product: Wordfence Firewall Plugin For Wordpress
Vendor: Wordfence
Vulnerable Version(s): 5.1.2
Tested Version: 5.1.2
Advisory Publication:  June 30, 2014  [without technical details]
Vendor Notification: June 24, 2014
Vendor Patch: June 29, 2014
Public Disclosure: June 30, 2014
Vulnerability Type:Reflected Cross-Site Scripting
CVE Reference: CVE-2014-4664
Risk Level: High
Solution Status: Fixed by Vendor
---------------------------------------------------------------
Reported By  - Narendra Bhati ( R00t Sh3ll)
Security Analyst  @ Suma Soft Pvt. Ltd. , Pune ( India )IT Risk & Security Management Services , Pune ( India)
Facebook - https://facebook.com/narendradewsoft
twitter - https://www.twitter.com/NarendraBhatiNB
Blog - http://hacktivity.websecgeeks.com
Email - bhati.contact@gmail.com
 
-----------------------------------------------------------------------------------------------

Advisory Details:

 
Narendra Bhati discovered vulnerability in Wordfence Firewall Plugin For Wordpress , which can be exploited to perform Cross-Site Scripting (XSS) attacks.
 
 
1) Reflected Cross-Site Scripting (XSS) in Wordfence Firewall Plugin For Wordpress : CVE-2014-4664
 
The vulnerability exists due to insufficient sanitization of input data passed via the "whoisval" HTTP GET parameter to "http://127.0.0.1/wp-admin/admin.php?page=WordfenceWhois&whoisval=" URL. A remote attacker can trick a logged-in administrator to open a specially crafted link and execute arbitrary HTML and script code in browser in context of the vulnerable website.
This vulnerability can be used against website administrator to perform phishing attacks, steal potentially sensitive data and gain complete control over web application.
 
The exploitation example below uses the "";</script><script>alert(/Oooppps !!! Bhati Got A XSS In WordPress Popular Firewall Plugin Word Fence /)</script>" JavaScript function to display "Oooppps !!! Bhati Got A XSS In WordPress Popular Firewall Plugin Word Fence" word:
 
http://127.0.0.1/wp-admin/admin.php?page=WordfenceWhois&whoisval=";</script><script>alert(/Oooppps !!! Bhati Got A XSS In WordPress Popular Firewall Plugin Word Fence /)</script>
-----------------------------------------------------------------------------------------------
 
Solution:
 
Update to " 5.1.4" From his official website or update from wordpress dashboard

 

¿Te gustó el post? COMPARTILO!



Ataque de diccionario cracking CMS Wordpress/Joomla Backtrack5r2 (Hacking/Deface

Iniciado por andrewtwo

Respuestas: 0
Vistas: 1981
Último mensaje Septiembre 02, 2012, 02:12:40 am
por andrewtwo
Flunym0us 2.0 - Escáner de vulnerabilidades para WordPress y Moodle

Iniciado por Pr0ph3t

Respuestas: 2
Vistas: 2589
Último mensaje Octubre 10, 2012, 12:57:40 pm
por Pr0ph3t
Los 3 modos más comunes de hackear WordPress y cómo evitarlo

Iniciado por Hackmundy

Respuestas: 2
Vistas: 6172
Último mensaje Marzo 06, 2013, 01:15:42 am
por b166er
Wordpress Business Intelligence Plugin - SQL injection

Iniciado por Mayk0

Respuestas: 0
Vistas: 1861
Último mensaje Abril 06, 2015, 12:16:18 am
por Mayk0
WordPress Bulletproof-Security .51 Multiple Vulnerabilities

Iniciado por Mayk0

Respuestas: 1
Vistas: 1998
Último mensaje Noviembre 07, 2014, 05:23:58 pm
por Y3K