Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 27 Oct 2015 12:33:02 +0530
From: Dis close <>
Subject: CVE Request: XSS in Blubrry PowerPress Podcasting wordpress plugin
 Version 6.0.4


# Title                       : Cross Site Scripting (XSS) in Blubrry
PowerPress Podcasting wordpress plugin Version 6.0.4
# Affected Product  : Blubrry PowerPress Podcasting wordpress plugin
# Vendor Homepage   :
# Vulnerability Type    : Cross Site Scripting (XSS)
# Risk                        : High
# POC URL               :
# Video URL               :
# Status : Fixed

By exploiting a Cross-site scripting vulnerability the attacker can hijack
a logged in user’s session by stealing cookies. This means that the
malicious hacker can change the logged in user’s password and invalidate
the session of the victim while the hacker maintains access.

Technical Details

   1. Logon into any wordpress application (localhost or public host)
   2. Modifying the value of tab variable in Blubrry PowerPress Version
   3. Fill all the variables with
   *"></script><script>alert(document.cookie);</script>* payload and send
   the request to the server.
   4. Now, the added XSS payload will be echoed back from the server
   without validating the input even after wp-config.php file has been
   configured with XSS filter settings.

Advisory Timeline
2015-09-04 – Discovered in Blubrry PowerPress Podcasting plugin 6.0.4
version. 2015-09-04 – Reported to 2015-09-07 – Vendor
Responded, "Thank you for reporting this plugin. We're looking into it
right now." 2015-09-09 – Fixed in Blubrry PowerPress Podcasting plugin
6.0.5 version.


Credits & Authors
================ from cybersecurityworks Pvt Ltd

About Cybersecurityworks
Cybersecurity Works is basically an auditing company passionate working on
findings & reporting security flaws & vulnerabilities on web application
and network. As professionals, we handle each client differently based on
their unique requirements. Visit our website for more information.


Cheers !!!

Team CSW

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.