Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 08 Dec 2011 12:39:05 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Henri Salo <henri@...v.fi>
Subject: Re: CVE-request WordPress pretty-link plugin 1.5.2
 XSS

On 12/08/2011 03:19 AM, Henri Salo wrote:
> Can I get CVE-identifier for this issue? I have verified this and reported this to the developer in here: http://wordpress.org/support/topic/plugin-pretty-link-lite-152-xss-vulnerability

Please use CVE-2011-4595 for this issue.
>
> - Henri Salo
>
> Original post below:
>
> ----- Forwarded message from irist.ir@...il.com -----
>
> Date: Sun, 4 Dec 2011 15:26:35 GMT
> From: irist.ir@...il.com
> To: bugtraq@...urityfocus.com
> Subject: Wordpress pretty-link.1.5.2 plugin Cross-Site Scripting
> 	Vulnerabilities
> X-Mailer: MIME-tools 5.420 (Entity 5.420)
>
> a bug in Wordpress pretty-link plugin that allows to us to occur a Cross-Site Scripting on a Remote machin.
>
>
>
>
>
> ############################################################################################################################################
> #                                                                                                                                          #
> #                           ISlamic Republic Of IRan Security Team                                                                         #
> #                                                                                                                                          #
> #                                http://irist.ir/forum/                                                                                    #
> #                                                                                                                                          #
> ############################################################################################################################################
> #                                                                                                                                          #
> # Wordpress pretty-link.1.5.2 plugin Cross-Site Scripting Vulnerabilities                                                                  #
> #                                                                                                                                          #
> # Download......: http://wordpress.org/extend/plugins/pretty-link/                                                                         #
> #                                                                                                                                          #
> # Exploit.......: http://www.site.com/[path]/wp-content/plugins/pretty-link/pretty-bar.php?url=[xss]                                       #
> #                                                                                                                                          #
> # Google Search.: "Powered by Wordpress"                                                                                                   #
> #                                                                                                                                          #
> ############################################################################################################################################
> #                                                                                                                                          #
> # Bug Found.....: IrIsT.Ir                                                                                                                 #
> #                                                                                                                                          #
> # discovery.....: Am!r (IrIsT?)                                                                                                            #
> #                                                                                                                                          #
> # contact.......: Amir[at]IrIsT.ir                                                                                                         #
> #                                                                                                                                          #
> # SP TNX........: The-0utl4w & A.u.r.A & B3HZ4D & m3hdi & joker_s & all IrIsT And Aria-security members                                    #
> #                                                                                                                                          #
> #   & Mehdi.H4ckcity &  2MzRp & mikili & All H4ckcity Members                                                                              #
> #                                                                                                                                          #
> ############################################################################################################################################
>
> ----- End forwarded message -----


-- 

-Kurt Seifried / Red Hat Security Response Team

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.