|
Message-ID: <CAMWaY3Mi6h9VEPFnC6kFy2+ukQ1ueB=41ZMz=ZR2Yk-+b4eRgQ@mail.gmail.com> Date: Tue, 27 Oct 2015 13:12:53 +0530 From: Dis close <disclose@...ersecurityworks.com> To: cve-assign@...re.org Cc: oss-security@...ts.openwall.com Subject: CVE Request: XSS Vulnerability in BulletProof Security Version .52.4 Hi, Details ================ # Title : XSS Vulnerability in BulletProof Security Version .52.4 # Affected Product : BulletProof Security Version .52.4 # Vendor Homepage : https://wordpress.org/plugins/bulletproof-security/ # Vulnerability Type : Cross Site Scripting # Risk : High # POC URL : https://github.com/cybersecurityworks/Disclosed/issues/3 # Video URL : https://www.youtube.com/watch?v=SCE1RmOAtXc&feature=youtu.be # Status : Fixed Description ================ By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged in user’s session by stealing cookies. This means that the malicious hacker can change the logged in user’s password and invalidate the session of the victim while the hacker maintains access. Technical Details ================ 1. Visit the following page on a site with this plugin installed. http://yourwordpresssite.com/wordpress/wp-admin/admin.php?page=bulletproof-security/admin/db-backup-security/db-backup-security.php 2. Modify the value of DBTablePrefix variable with *"></script><script>alert(document.cookie);</script> *payload and send the request to the server. 3. Now, the added XSS payload will be echoed back from the server without validating the input. It also affects wp-config.php file, *$table_prefix *and corrupts the database connectivity. Advisory Timeline ================ 2015-09-04 – Discovered in BulletProof Security Plugin Version .52.4 2015-09-04 – Reported to BulletProof Security Pro Support Team & plugins@...dpress.org 2015-09-04 – Acknowledged & Informed by developer about new version going to be pushed soon along with credit for findings issue. 2015-09-05 – Requested for Advance CVE 2015-09-09 – Fixed in BulletProof Security Plugin Version .52.5 Fix ================ https://www.owasp.org/index.php/Cross-site_Scripting_(XSS) Credits & Authors ================ sathish@...ersecurityworks.com from cybersecurityworks Pvt Ltd About Cybersecurityworks ================ Cybersecurity Works is basically an auditing company passionate working on findings & reporting security flaws & vulnerabilities on web application and network. As professionals, we handle each client differently based on their unique requirements. Visit our website http://www.cybersecurityworks.com/ for more information. Please assign CVE as appropriate. Thanks for your valuable time & effort taken. -- Cheers !!! Team CSW
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.