zoukankan      html  css  js  c++  java
  • WordPress Duplicator 0.4.4 Cross Site Scripting

    测试方法:

    提供程序(方法)可能带有攻击性,仅供安全研究与教学之用,风险自负!
      1. Advisory ID: HTB23162
      2. Product:DuplicatorWordPressPlugin
      3. Vendor:LifeInTheGrid
      4. VulnerableVersion(s):0.4.4and probably prior
      5. TestedVersion:0.4.4
      6. VendorNotification:June19,2013
      7. VendorPatch:July21,2013
      8. PublicDisclosure:July24,2013
      9. VulnerabilityType:Cross-SiteScripting[CWE-79]
      10. CVE Reference: CVE-2013-4625
      11. RiskLevel:Low
      12. CVSSv2BaseScore:2.6(AV:N/AC:H/Au:N/C:N/I:P/A:N)
      13. SolutionStatus:FixedbyVendor
      14. DiscoveredandProvided:High-TechBridgeSecurityResearchLab( https://www.htbridge.com/advisory/ )
      15.  
      16. -----------------------------------------------------------------------------------------------
      17.  
      18. AdvisoryDetails:
      19.  
      20. High-TechBridgeSecurityResearchLab discovered XSS vulnerability inDuplicatorWordPress plugin, which can be exploited to perform cross-site scripting attacks against vulnerable application.
      21.  
      22.  
      23. 1)Cross-SiteScripting(XSS)inDuplicatorWordPressPlugin: CVE-2013-4625
      24.  
      25. The vulnerability exists due to insufficient filtration of user-supplied data in"package" HTTP GET parameter passed to "/wp-content/plugins/duplicator/files/installer.cleanup.php" script. A remote attacker can trick a logged-in administrator to open a specially crafted link and execute arbitrary HTML and script code in browser in context of the vulnerable website.
      26.  
      27. The exploitation example below uses the "alert()"JavaScriptfunction to display administrator's cookies:
      28.  
      29. http://[host]/wp-content/plugins/duplicator/files/installer.cleanup.php?remove=1&package=%3Cscript%3Ealert%28document.cookie%29;%3C/script%3E
      30.  
      31.  
      32. -----------------------------------------------------------------------------------------------
      33.  
      34. Solution:
      35.  
      36. Upgrade to Duplicator 0.4.5
      37.  
      38. More Information:
      39. http://support.lifeinthegrid.com/knowledgebase.php?article=20
      40.  
      41. -----------------------------------------------------------------------------------------------
      42.  
      43. References:
      44.  
      45. [1] High-Tech Bridge Advisory HTB23162 - https://www.htbridge.com/advisory/HTB23162 - Cross-Site Scripting (XSS) in Duplicator WordPress Plugin.
      46. [2] Duplicator WordPress Plugin - http://lifeinthegrid.com/labs/duplicator/ - This free plugin available at wordpress.org is a powerful tool you can use to rapidly clone and deploy any WordPress site.
      47. [3] Common Vulnerabilities and Exposures (CVE) - http://cve.mitre.org/ - international in scope and free for public use, CVE® is a dictionary of publicly known information security vulnerabilities and exposures.
      48. [4] Common Weakness Enumeration (CWE) - http://cwe.mitre.org - targeted to developers and security practitioners, CWE is a formal list of software weakness types.
  • 相关阅读:
    XML文件的操作说明
    IIS中如何应用程序启用https协议
    sql server中的数据类型转换函数
    sql语句中的join连接(左连接、右连接、全连接、内连接)
    sql语句中日期相减的操作
    C# NameValueCollection集合
    json的两种表示结构(对象和数组).。
    ASP.NET中一般处理程序报的错误:由于代码已经过优化或者本机框架位于调用堆栈之上,无法计算表达式的值
    C#中类的实例是不能 获取到类中的静态方法和静态变量(Static)的,及原因
    《好好学Java 从零基础到项目实战》姗姗而来
  • 原文地址:https://www.cnblogs.com/security4399/p/3218056.html
Copyright © 2011-2022 走看看