zoukankan      html  css  js  c++  java
  • WordPress Duplicator 0.4.4 Cross Site Scripting

    测试方法:

    提供程序(方法)可能带有攻击性,仅供安全研究与教学之用,风险自负!
      1. Advisory ID: HTB23162
      2. Product:DuplicatorWordPressPlugin
      3. Vendor:LifeInTheGrid
      4. VulnerableVersion(s):0.4.4and probably prior
      5. TestedVersion:0.4.4
      6. VendorNotification:June19,2013
      7. VendorPatch:July21,2013
      8. PublicDisclosure:July24,2013
      9. VulnerabilityType:Cross-SiteScripting[CWE-79]
      10. CVE Reference: CVE-2013-4625
      11. RiskLevel:Low
      12. CVSSv2BaseScore:2.6(AV:N/AC:H/Au:N/C:N/I:P/A:N)
      13. SolutionStatus:FixedbyVendor
      14. DiscoveredandProvided:High-TechBridgeSecurityResearchLab( https://www.htbridge.com/advisory/ )
      15.  
      16. -----------------------------------------------------------------------------------------------
      17.  
      18. AdvisoryDetails:
      19.  
      20. High-TechBridgeSecurityResearchLab discovered XSS vulnerability inDuplicatorWordPress plugin, which can be exploited to perform cross-site scripting attacks against vulnerable application.
      21.  
      22.  
      23. 1)Cross-SiteScripting(XSS)inDuplicatorWordPressPlugin: CVE-2013-4625
      24.  
      25. The vulnerability exists due to insufficient filtration of user-supplied data in"package" HTTP GET parameter passed to "/wp-content/plugins/duplicator/files/installer.cleanup.php" script. A remote attacker can trick a logged-in administrator to open a specially crafted link and execute arbitrary HTML and script code in browser in context of the vulnerable website.
      26.  
      27. The exploitation example below uses the "alert()"JavaScriptfunction to display administrator's cookies:
      28.  
      29. http://[host]/wp-content/plugins/duplicator/files/installer.cleanup.php?remove=1&package=%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
      30.  
      31.  
      32. -----------------------------------------------------------------------------------------------
      33.  
      34. Solution:
      35.  
      36. Upgrade to Duplicator 0.4.5
      37.  
      38. More Information:
      39. http://support.lifeinthegrid.com/knowledgebase.php?article=20
      40.  
      41. -----------------------------------------------------------------------------------------------
      42.  
      43. References:
      44.  
      45. [1] High-Tech Bridge Advisory HTB23162 - https://www.htbridge.com/advisory/HTB23162 - Cross-Site Scripting (XSS) in Duplicator WordPress Plugin.
      46. [2] Duplicator WordPress Plugin - http://lifeinthegrid.com/labs/duplicator/ - This free plugin available at wordpress.org is a powerful tool you can use to rapidly clone and deploy any WordPress site.
      47. [3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
      48. [4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
  • 相关阅读:
    机器学习数学笔记|Taylor展开式与拟牛顿
    机器学习数学笔记|微积分梯度jensen不等式
    [DeeplearningAI笔记]第三章2.9-2.10端到端学习
    [DeeplearningAI笔记]第三章2.7-2.8多任务学习/迁移学习
    [DeeplearningAI笔记]第三章2.4-2.6不匹配的训练和开发/测试数据
    [DeeplearningAI笔记]第三章2.1-2.3误差分析
    [DeeplearningAI笔记]第三章1.8-1.12可避免误差与模型改善
    [DeeplearningAI笔记]第三章1.4-1.7开发集测试集划分与满足与优化指标
    [DeeplearningAI笔记]第三章1.1-1.3查准率/查全率/F1分数
    [DeeplearningAI笔记]第二章3.8-3.9分类与softmax
  • 原文地址:https://www.cnblogs.com/security4399/p/3218056.html
Copyright © 2011-2022 走看看