Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 27 Oct 2015 12:55:22 +0530
From: Dis close <disclose@...ersecurityworks.com>
To: cve-assign@...re.org
Cc: oss-security@...ts.openwall.com
Subject: CVE Request: XSS in Fast Secure Contact Form version 4.0.37

Hi,

Details
================
# Title : XSS in Fast Secure Contact Form version 4.0.37
# Affected Product : Fast Secure Contact Form version 4.0.37
# Vendor Homepage :  *https://wordpress.org/plugins/si-contact-form/
<https://wordpress.org/plugins/si-contact-form/>*
# Vulnerability Type : Cross Site Scripting
# Risk :  High
# POC URL               :
https://github.com/cybersecurityworks/Disclosed/issues/4
# Video URL: https://www.youtube.com/watch?v=eDpqIFTE7t8&feature=youtu.be
# Status : Fixed

Description
================
By exploiting a Cross-site scripting vulnerability the attacker can hijack
a logged in user’s session by stealing cookies. This means that the
malicious hacker can change the logged in user’s password and invalidate
the session of the victim while the hacker maintains access.

Technical Details
================

   1. Visit the following page on a site with this plugin installed.
   http://wordpresssite.com/wordpress/wp-admin/plugins.php?page=si-contact-form%2Fsi-contact-form.php&fscf_form=1&fscf_tab=1

   2. Modify the value of *fs_contact_form1[welcome]* variable with
   *<script>alert(document.cookie);</script> *the server.
   3. Now, the added XSS payload will be echoed back from the server
   without payload and send the request to validating the input whenever we
   visit the script stored page.


Advisory Timeline
================
2015-09-05 – Discovered in Fast Secure Contact Form version 4.0.37
2015-09-07 – Reported to plugins@...dpress.org
2015-09-07 – Vendor Responded
2015-09-08 – Fixed in Fast Secure Contact Form version 4.0.38

Fix
================
https://github.com/cybersecurityworks/Disclosed/issues/7
https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)

Credits & Authors
================
sathish@...ersecurityworks.com from cybersecurityworks Pvt Ltd

About Cybersecurityworks
================
Cybersecurity Works is basically an auditing company passionate working on
findings & reporting security flaws & vulnerabilities on web application
and network. As professionals, we handle each client differently based on
their unique requirements. Visit our website
http://www.cybersecurityworks.com/ for more information.

Please assign CVE as appropriate. Thanks for your valuable time & effort
taken.

--

Cheers !!!

Team CSW

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ