Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 1 Jul 2015 13:53:46 +0000
From: "Seaman, Chad" <>
To: "" <>, ""
	<>, ""
Subject: Re: CVE request: persistent XSS in Wordpress Plugin
 NewStatPress v.1.0.3

Was recently told by mitre that http referer injections don't "count" because my PoC used the curl referer flag rather that a malicious redirect...

Curious to see what they say here.

- Chad

------ Original message------

From: Responsive Disclosure | HSASec

Date: Wed, Jul 1, 2015 3:55 AM


Subject:[oss-security] CVE request: persistent XSS in Wordpress Plugin NewStatPress v.1.0.3

Created Tuesday 30 June 2015

Dear Sir or Mam,

we want to inform you about a security vulnerability in one of the
plugins provided by you or one member of your company.
Please regard the information below.

NewStatPress (



ice00 (

reported: 2015-06-30
fixed in version 1.04, 2015-06-30


Type of vulnerability:
persistent XSS via HTTP-Header (Referer) (no authentication required)

An unsifficent user input validation (of HTTP-Header: Referer) results
in a persistent XSS in the wordpress admin-panel. So an attacker may be
able to access any cookies, session tokens or other sensitive
information retained by the browser and used with that site.

Proof of Concept:
yes (internal)

* Michael Kapfer (

Best regards,
HSASec-Team (

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.