WordPress Wordfence Firewall 5.1.2 Cross Site Scripting

37   2019-08-05 08:08   nipc
漏洞信息
漏洞编号: 1326
CVE编号: CVE-2014-4664
漏洞类型: -
漏洞来源: cxs
发布日期: 2014-11-05
CVSS
CVSS值: 4.3/10
严重级别: 低危
利用范围: Remote
攻击复杂度: Medium
认证级别: No required
漏洞描述

WLB-2014110016[***]http://cxsecurity.com/issue/WLB-2014110016[***]Bug: WordPress Wordfence Firewall 5.1.2 Cross Site Scripting ( Ascii Version )[***]WordPress Wordfence Firewall 5.1.2 Cross Site Scripting[***]2014.11.05[***]Narendra Bhati[***]Low[***]CWE-79@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** [***]CVE-2014-4664@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893********[***]No[***]Yes[***]4.3/10[***]2.9/10[***]8.6/10[***]Remote[***]No required[***]None[***]Partial[***]None[***] Product: Wordfence Firewall Plugin For Wordpress @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Vendor: Wordfence@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Vulnerable Version(s): 5.1.2@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Tested Version: 5.1.2@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Advisory Publication: June 30, 2014 [without technical details]@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Vendor Notification: June 24, 2014 @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Vendor Patch: June 29, 2014 @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Public Disclosure: June 30, 2014 @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Vulnerability Type:Reflected Cross-Site Scripting@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** CVE Reference: CVE-2014-4664@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Risk Level: High@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Solution Status: Fixed by Vendor@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** ---------------------------------------------------------------@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Reported By - Narendra Bhati ( R00t Sh3ll)@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Security Analyst @ Suma Soft Pvt. Ltd. , Pune ( India )IT Risk & Security Management Services , Pune ( India)@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Facebook - https://facebook.com/narendradewsoft@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** twitter - https://www.twitter.com/NarendraBhatiNB@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Blog - http://hacktivity.websecgeeks.com@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Email - bhati.contact@gmail.com@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** -----------------------------------------------------------------------------------------------@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Advisory Details:@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Narendra Bhati discovered vulnerability in Wordfence Firewall Plugin For Wordpress , which can be exploited to perform@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** Cross-Site Scripting (XSS) attacks.@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** 1) Reflected Cross-Site Scripting (XSS) in Wordfence Firewall Plugin For Wordpress : CVE-2014-4664@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** @@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** The vulnerability exists due to insufficient sanitization of input data passed via the "whoisval" HTTP GET@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** parameter to "http://127.0.0.1/wp-admin/admin.php?page=WordfenceWhois&whoisval=" URL. A remote attacker@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** can trick a logged-in administrator to open a specially crafted link and execute arbitrary HTML and script code in@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** browser in context of the vulnerable website.@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&##########suijishu0518893******** This vulnerability can be used against website administrator to perform phishing attacks, steal potentially sensitive@@@@@@@@@@$$$$$$$$$$&&&&&&&&&&#####

POC

Product: Wordfence Firewall Plugin For Wordpress Vendor: Wordfence Vulnerable Version(s): 5.1.2 Tested Version: 5.1.2 Advisory Publication: June 30, 2014 [without technical details] Vendor Notification: June 24, 2014 Vendor Patch: June 29, 2014 Public Disclosure: June 30, 2014 Vulnerability Type:Reflected Cross-Site Scripting CVE Reference: CVE-2014-4664 Risk Level: High Solution Status: Fixed by Vendor --------------------------------------------------------------- Reported By - Narendra Bhati ( R00t Sh3ll) Security Analyst @ Suma Soft Pvt. Ltd. , Pune ( India )IT Risk & Security Management Services , Pune ( India) Facebook - https://facebook.com/narendradewsoft twitter - https://www.twitter.com/NarendraBhatiNB Blog - http://hacktivity.websecgeeks.com Email - bhati.contact@gmail.com ----------------------------------------------------------------------------------------------- Advisory Details: Narendra Bhati discovered vulnerability in Wordfence Firewall Plugin For Wordpress , which can be exploited to perform Cross-Site Scripting (XSS) attacks. 1) Reflected Cross-Site Scripting (XSS) in Wordfence Firewall Plugin For Wordpress : CVE-2014-4664 The vulnerability exists due to insufficient sanitization of input data passed via the "whoisval" HTTP GET parameter to "http://127.0.0.1/wp-admin/admin.php?page=WordfenceWhois&whoisval=" URL. A remote attacker can trick a logged-in administrator to open a specially crafted link and execute arbitrary HTML and script code in browser in context of the vulnerable website. This vulnerability can be used against website administrator to perform phishing attacks, steal potentially sensitive data and gain complete control over web application. The exploitation example below uses the "";</script><script>alert(/Oooppps !!! Bhati Got A XSS In WordPress Popular Firewall Plugin Word Fence /)</script>" JavaScript function to display "Oooppps !!! Bhati Got A XSS In WordPress Popular Firewall Plugin Word Fence" word: http://127.0.0.1/wp-admin/admin.php?page=WordfenceWhois&whoisval=";</script><script>alert(/Oooppps !!! Bhati Got A XSS In WordPress Popular Firewall Plugin Word Fence /)</script> ----------------------------------------------------------------------------------------------- Solution: Update to " 5.1.4" From his official website or update from wordpress dashboard More Information: Vendor Public Advisory http://www.wordfence.com/blog/2014/06/security-fix-wordfence-5-1-4/ Full Disclosure With Technical Details - http://hacktivity.websecgeeks.com/word-press-firewall-plugin-xss/ -----------------------------------------------------------------------------------------------