You are here

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks

January 28, 2013 - 12:32am

Addthis

PROBLEM:

WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks

PLATFORM:

WordPress all versions are affected prior to 3.5.1

ABSTRACT:

WordPress 3.5.1 Maintenance and Security Release

REFERENCE LINKS:

WordPress News
SecurityTracker Alert ID:  1028045
Secunia Advisory SA51967

IMPACT ASSESSMENT:

Medium

DISCUSSION:

Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Shortcodes and post content are affected

IMPACT:

A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WordPress software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

A remote user can obtain potentially sensitive information about a target site and potentially compromise the site.

SOLUTION:

WordPress 3.5.1 is now available

Addthis