Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 25 Feb 2013 14:24:11 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Henri Salo <henri@...v.fi>, plugins@...dpress.org
Subject: Re: CVE request: WordPress plugin smart-flv jwplayer.swf
 XSS

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 02/24/2013 03:23 PM, Henri Salo wrote:
> Hello list,
> 
> With wpscan-team I noticed that file jwplayer.swf in WordPress
> plugin smart-flv is vulnerable to reflected XSS vulnerability.
> 
> URL: http://wordpress.org/extend/plugins/smart-flv/ 
> 416d0313c5f286c3a8e9daff520a9f44439b93f7
> http://plugins.svn.wordpress.org/smart-flv/trunk/jwplayer.swf
> 
> With user interaction (clicking the page): 
> https://example.com/wp-content/plugins/smart-flv/jwplayer.swf?file=1.mp4&link=javascript:alert%28%22horse%22%29&linktarget=_self&displayclick=link
>
> 
No interaction:
> https://example.com/wp-content/plugins/smart-flv/jwplayer.swf?playerready=alert%28%22horse%22%29
>
>  WordPress guys could you report this to the developer since I
> don't know his/her email address, thanks? Could you also tell me if
> there is a way to contact plugin developers directly, thank you.
> Please include CVE to changelog if possible.
> 
> -- Henri Salo ps. http://paste.nerv.fi/36167527-horse.jpeg
> 

Please use CVE-2013-1765 for this issue.

- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.13 (GNU/Linux)
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=u+Fn
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.