zoukankan      html  css  js  c++  java
  • WordPress Duplicator 0.4.4 Cross Site Scripting

    测试方法:

    提供程序(方法)可能带有攻击性,仅供安全研究与教学之用,风险自负!
      1. Advisory ID: HTB23162
      2. Product:DuplicatorWordPressPlugin
      3. Vendor:LifeInTheGrid
      4. VulnerableVersion(s):0.4.4and probably prior
      5. TestedVersion:0.4.4
      6. VendorNotification:June19,2013
      7. VendorPatch:July21,2013
      8. PublicDisclosure:July24,2013
      9. VulnerabilityType:Cross-SiteScripting[CWE-79]
      10. CVE Reference: CVE-2013-4625
      11. RiskLevel:Low
      12. CVSSv2BaseScore:2.6(AV:N/AC:H/Au:N/C:N/I:P/A:N)
      13. SolutionStatus:FixedbyVendor
      14. DiscoveredandProvided:High-TechBridgeSecurityResearchLab( https://www.htbridge.com/advisory/ )
      15.  
      16. -----------------------------------------------------------------------------------------------
      17.  
      18. AdvisoryDetails:
      19.  
      20. High-TechBridgeSecurityResearchLab discovered XSS vulnerability inDuplicatorWordPress plugin, which can be exploited to perform cross-site scripting attacks against vulnerable application.
      21.  
      22.  
      23. 1)Cross-SiteScripting(XSS)inDuplicatorWordPressPlugin: CVE-2013-4625
      24.  
      25. The vulnerability exists due to insufficient filtration of user-supplied data in"package" HTTP GET parameter passed to "/wp-content/plugins/duplicator/files/installer.cleanup.php" script. A remote attacker can trick a logged-in administrator to open a specially crafted link and execute arbitrary HTML and script code in browser in context of the vulnerable website.
      26.  
      27. The exploitation example below uses the "alert()"JavaScriptfunction to display administrator's cookies:
      28.  
      29. http://[host]/wp-content/plugins/duplicator/files/installer.cleanup.php?remove=1&package=%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
      30.  
      31.  
      32. -----------------------------------------------------------------------------------------------
      33.  
      34. Solution:
      35.  
      36. Upgrade to Duplicator 0.4.5
      37.  
      38. More Information:
      39. http://support.lifeinthegrid.com/knowledgebase.php?article=20
      40.  
      41. -----------------------------------------------------------------------------------------------
      42.  
      43. References:
      44.  
      45. [1] High-Tech Bridge Advisory HTB23162 - https://www.htbridge.com/advisory/HTB23162 - Cross-Site Scripting (XSS) in Duplicator WordPress Plugin.
      46. [2] Duplicator WordPress Plugin - http://lifeinthegrid.com/labs/duplicator/ - This free plugin available at wordpress.org is a powerful tool you can use to rapidly clone and deploy any WordPress site.
      47. [3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
      48. [4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
  • 相关阅读:
    php的序列化和反序列化有什么好处?
    解析PHP多种序列化与反序列化的方法
    PHP 数组和字符串互相转换实现方法
    PHP中foreach()用法汇总
    php实现伪静态的方法
    PHP中如何定义类及其成员属性与操作
    单例模式优缺点
    PHP 单例模式解析和实战
    主从复制之莫名少表
    诡异的 ERROR 1045 (28000): Access denied for user 错误
  • 原文地址:https://www.cnblogs.com/security4399/p/3218056.html
Copyright © 2011-2022 走看看