Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <5592E886.5090208@hsasec.de>
Date: Tue, 30 Jun 2015 21:05:42 +0200
From: Responsive Disclosure | HSASec <disclosure@...sec.de>
To: cve-assign@...re.org, 
 "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
Subject: CVE request: persistent XSS in Wordpress Plugin NewStatPress v.1.0.3

OpenWallInfo
============
Created Tuesday 30 June 2015

Dear Sir or Mam,

we want to inform you about a security vulnerability in one of the
plugins provided by you or one member of your company.
Please regard the information below.

Plugin:
NewStatPress (https://wordpress.org/plugins/newstatpress/)

Product-Type:
Wordpress-Plugin

Version:
1.0.3

Vendor:         
ice00 (http://newstatpress.altervista.org/?page_id=2)

Fixed:             
reported: 2015-06-30
fixed in version 1.04, 2015-06-30

Changelog:         
https://wordpress.org/plugins/newstatpress/changelog/


Type of vulnerability:
persistent XSS via HTTP-Header (Referer) (no authentication required)

Description:  
An unsifficent user input validation (of HTTP-Header: Referer) results
in a persistent XSS in the wordpress admin-panel. So an attacker may be
able to access any cookies, session tokens or other sensitive
information retained by the browser and used with that site.  

Proof of Concept:
yes (internal)

Researchers:
* Michael Kapfer (Michael.Kapfer@...augsburg.de)

Best regards,
HSASec-Team (https://www.HSASec.de)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.