Date: Sat, 23 May 2015 11:40:46 +0000 From: Nitin Venkatesh <venkatesh.nitin@...il.com> To: cve-assign@...re.org Cc: oss-security@...ts.openwall.com Subject: Re: Wordpress Roomcloud plugin v1.1(rev @1115307) XSS vulnerability Hi team, Thank you for CVE-2015-3904. Just wanted to update that the developer has now bumped up the version number and updated the changelog to reflect the changes. Please note that the patched version now is v1.3 and the changelog can be found here - https://wordpress.org/plugins/roomcloud/changelog/ On Sat, 23 May 2015 at 00:34 <cve-assign@...re.org> wrote: > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > > http://seclists.org/fulldisclosure/2015/May/40 > > https://plugins.trac.wordpress.org/changeset/1117499 > > > # Affected Versions: Tested on v1.1 (revision @1115307) > > # Fixed Version: v1.1 (revision @1117499) > > (The https://wordpress.org/plugins/roomcloud/changelog/ page does not > currently list this issue. Note that a download labeled 1.1 could > potentially be either a vulnerable version or a fixed version.) > > > Unsantized POST parameters are susceptible to XSS in the roomcloud.php > file > > viz., (1)pin, (2)start_day, (3)start_month, (4)start_year, (5)end_day, > > (6)end_month, (7)end_year, (8)lang, (9)adults, (10)children > > The implication seems to be that potential hotel guests, who obviously > do not have administrative access to the hotel web site, can make the > POST request. Use CVE-2015-3904. > > - -- > CVE assignment team, MITRE CVE Numbering Authority > M/S M300 > 202 Burlington Road, Bedford, MA 01730 USA > [ PGP key available through http://cve.mitre.org/cve/request_id.html ] > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.14 (SunOS) > > iQEcBAEBAgAGBQJVX30nAAoJEKllVAevmvms6Q8H/0pXtn2l5nEy3dTh1S3YH7xD > capTFDit0z8L4SzFR4BrJx0YEpEgOujsZdLRZkJzZbT3gw3Sgk3H3sELl82DHu3Q > oHx+K+Gg3MptO+yVinivPkWyKdGn63UxVKwCX58nU3JA7b3FHnxlyRiC/wihyxyx > KBu0RZ+3gW9+jiJTyLs00SJ/NTAG+HjivhBbMqUP+suOvExhlnNgF1EUeB5LftGF > LppAP17wYYKvy1m+upk+JdlmzBA4K7uxPpklkfSXdcQbOxN7GnNrBB31uzFrff88 > 6P8AMpwGJOscJ3VjTnI7XIyzyn2I9sWCd5y1FhIexyMse73rJt+aGjMQZGYKf/w= > =WA80 > -----END PGP SIGNATURE----- >
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ