Date: Tue, 30 Jun 2015 21:05:42 +0200 From: Responsive Disclosure | HSASec <disclosure@...sec.de> To: cve-assign@...re.org, "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: CVE request: persistent XSS in Wordpress Plugin NewStatPress v.1.0.3 OpenWallInfo ============ Created Tuesday 30 June 2015 Dear Sir or Mam, we want to inform you about a security vulnerability in one of the plugins provided by you or one member of your company. Please regard the information below. Plugin: NewStatPress (https://wordpress.org/plugins/newstatpress/) Product-Type: Wordpress-Plugin Version: 1.0.3 Vendor: ice00 (http://newstatpress.altervista.org/?page_id=2) Fixed: reported: 2015-06-30 fixed in version 1.04, 2015-06-30 Changelog: https://wordpress.org/plugins/newstatpress/changelog/ Type of vulnerability: persistent XSS via HTTP-Header (Referer) (no authentication required) Description: An unsifficent user input validation (of HTTP-Header: Referer) results in a persistent XSS in the wordpress admin-panel. So an attacker may be able to access any cookies, session tokens or other sensitive information retained by the browser and used with that site. Proof of Concept: yes (internal) Researchers: * Michael Kapfer (Michael.Kapfer@...augsburg.de) Best regards, HSASec-Team (https://www.HSASec.de)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.