zoukankan      html  css  js  c++  java
  • WordPress Duplicator 0.4.4 Cross Site Scripting

    测试方法:

    提供程序(方法)可能带有攻击性,仅供安全研究与教学之用,风险自负!
      1. Advisory ID: HTB23162
      2. Product:DuplicatorWordPressPlugin
      3. Vendor:LifeInTheGrid
      4. VulnerableVersion(s):0.4.4and probably prior
      5. TestedVersion:0.4.4
      6. VendorNotification:June19,2013
      7. VendorPatch:July21,2013
      8. PublicDisclosure:July24,2013
      9. VulnerabilityType:Cross-SiteScripting[CWE-79]
      10. CVE Reference: CVE-2013-4625
      11. RiskLevel:Low
      12. CVSSv2BaseScore:2.6(AV:N/AC:H/Au:N/C:N/I:P/A:N)
      13. SolutionStatus:FixedbyVendor
      14. DiscoveredandProvided:High-TechBridgeSecurityResearchLab( https://www.htbridge.com/advisory/ )
      15.  
      16. -----------------------------------------------------------------------------------------------
      17.  
      18. AdvisoryDetails:
      19.  
      20. High-TechBridgeSecurityResearchLab discovered XSS vulnerability inDuplicatorWordPress plugin, which can be exploited to perform cross-site scripting attacks against vulnerable application.
      21.  
      22.  
      23. 1)Cross-SiteScripting(XSS)inDuplicatorWordPressPlugin: CVE-2013-4625
      24.  
      25. The vulnerability exists due to insufficient filtration of user-supplied data in"package" HTTP GET parameter passed to "/wp-content/plugins/duplicator/files/installer.cleanup.php" script. A remote attacker can trick a logged-in administrator to open a specially crafted link and execute arbitrary HTML and script code in browser in context of the vulnerable website.
      26.  
      27. The exploitation example below uses the "alert()"JavaScriptfunction to display administrator's cookies:
      28.  
      29. http://[host]/wp-content/plugins/duplicator/files/installer.cleanup.php?remove=1&package=%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
      30.  
      31.  
      32. -----------------------------------------------------------------------------------------------
      33.  
      34. Solution:
      35.  
      36. Upgrade to Duplicator 0.4.5
      37.  
      38. More Information:
      39. http://support.lifeinthegrid.com/knowledgebase.php?article=20
      40.  
      41. -----------------------------------------------------------------------------------------------
      42.  
      43. References:
      44.  
      45. [1] High-Tech Bridge Advisory HTB23162 - https://www.htbridge.com/advisory/HTB23162 - Cross-Site Scripting (XSS) in Duplicator WordPress Plugin.
      46. [2] Duplicator WordPress Plugin - http://lifeinthegrid.com/labs/duplicator/ - This free plugin available at wordpress.org is a powerful tool you can use to rapidly clone and deploy any WordPress site.
      47. [3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
      48. [4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
  • 相关阅读:
    iBatis的基本使用
    修改浏览器语言环境
    JavaScript实现级联下拉框
    Spring2.5与JDK8的集成问题
    JDK API文档下载
    C程序:年转化天
    线程基础
    拷贝控制之拷贝、赋值、销毁
    jquery中attr、prop、data
    input 类型为number型时,maxlength不生效?
  • 原文地址:https://www.cnblogs.com/security4399/p/3218056.html
Copyright © 2011-2022 走看看