Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <149ffd43-942f-3e77-31dc-897e0ccec1e2@securify.nl>
Date: Thu, 8 Sep 2016 19:27:41 +0200
From: Summer of Pwnage <lists@...urify.nl>
To: oss-security@...ts.openwall.com
Subject: Persistent Cross-Site Scripting vulnerability in WordPress due to
 unsafe processing of file names

------------------------------------------------------------------------
Persistent Cross-Site Scripting vulnerability in WordPress due to unsafe
processing of file names
------------------------------------------------------------------------
Han Sahin, July 2016

------------------------------------------------------------------------
Abstract
------------------------------------------------------------------------
A persistent Cross-Site Scripting (XSS) vulnerability has been found in
WordPress. An attacker can create a specially crafted image file name
which, when uploaded in WordPress, injects malicious JavaScript code
into the application. An attacker can use this vulnerability to perform
a wide variety of actions, such as stealing victims' session tokens or
login credentials, and performing arbitrary actions on their behalf.

------------------------------------------------------------------------
OVE ID
------------------------------------------------------------------------
OVE-20160724-0018

------------------------------------------------------------------------
Tested versions
------------------------------------------------------------------------
This issue was successfully tested on WordPress [2] 4.5.3.

------------------------------------------------------------------------
Fix
------------------------------------------------------------------------
This vulnerability is resolved in WordPress 4.6.1 [3] (Release Notes
[4]).

------------------------------------------------------------------------
Introduction
------------------------------------------------------------------------
WordPress Media Upload functionality is used to upload image, audio,
video and other allowed file extensions. The uploaded media types are
automatically available to public users via so called public 'Attachment
Pages'.

------------------------------------------------------------------------
Details
------------------------------------------------------------------------
WordPress performs insufficient validation on the file name of uploaded
media types and in specific images. The file name of an image is used as
image Title (meta) in so called ‘attachment pages’ (HTML). An
attacker can exploit this vulnerability by crafting an image file name
with Cross-Site Scripting payload and lure an admin into uploading the
image with the malicious file name.

------------------------------------------------------------------------
Limitations
------------------------------------------------------------------------

Operating System

Please note that the WordPress admin (victim) needs to use an operating
system like for example Mac or Linux. These provide extended file name
capabilities necessary for an attacker to be able to successfully use
this vulnerability.

Social Engineering

For the attack to succeed the following conditions have to be met:

- A WordPress admin uploads a malicious image file requested by a user
this admin trusts or a popular malicious image that was spread via
social media. This involves social engineering. In the Proof of Concept
the file name cengizhansahinsumofpwn<img src=a
onerror=alert(document.cookie)>.jpg was used.

- An attacker can now determine if the file name with which the
malicious file is available on the WordPress site. With this information
he can spread the URL to end users and the WordPress admin.

------------------------------------------------------------------------
References
------------------------------------------------------------------------
[1] 
https://sumofpwn.nl/advisory/2016/persistent_cross_site_scripting_vulnerability_in_wordpress_due_to_unsafe_processing_of_file_names.html
[2] https://wordpress.org/
[3] https://wordpress.org/wordpress-4.6.1.zip
[4] 
https://wordpress.org/news/2016/09/wordpress-4-6-1-security-and-maintenance-release/

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.