[wp-trac] Re: [WordPress Trac] #3879: XSS in 2.1.1 in AYS for HTTP
GET requests
WordPress Trac
wp-trac at lists.automattic.com
Tue Feb 27 23:14:12 GMT 2007
#3879: XSS in 2.1.1 in AYS for HTTP GET requests
----------------------+-----------------------------------------------------
Reporter: Reaper-X | Owner: anonymous
Type: defect | Status: closed
Priority: low | Milestone: 2.1.2
Component: Security | Version: 2.1.1
Severity: normal | Resolution: fixed
Keywords: |
----------------------+-----------------------------------------------------
Changes (by markjaquith):
* summary: XSS in 2.1.1 input passed to the "post" parameter in wp-
admin/post.php => XSS in 2.1.1 in AYS for HTTP
GET requests
Old description:
> http://www.securityfocus.com/archive/1/461351/30/0/ threaded.
> http://secunia.com/advisories/24316/ reads:
>
> Input passed to the "post" parameter in wp-admin/post.php (when "action"
> is set to "delete") is not properly sanitised before being returned to a
> user. This can be exploited to execute arbitrary HTML and script code in
> a user's browser session in context of an affected site.
>
> Successful exploitation requires that the target user is logged in as
> administrator.
New description:
http://www.securityfocus.com/archive/1/461351/30/0/ threaded.
http://secunia.com/advisories/24316/ reads:
Input passed to the "post" parameter in wp-admin/post.php (when "action"
is set to "delete") is not properly sanitised before being returned to a
user. This can be exploited to execute arbitrary HTML and script code in a
user's browser session in context of an affected site.
Successful exploitation requires that the target user is logged in as
administrator.
----
The exploit is actually more general than that: for any action that
triggers nonce verification, the URL for the "Yes" action is not properly
sanitized, and a specially crafted URL can escape from the link's
{{{href}}} attribute and inject arbitrary HTML. The "delete" action and
the "post" parameter just happen to be the ones used in the example.
Comment:
Just clearing up some confusion... some people think that this has
something to do with deleting posts because of the specific example that
was released. The exploit is more general than that, and it is purely an
XSS hole.
--
Ticket URL: <http://trac.wordpress.org/ticket/3879#comment:3>
WordPress Trac <http://trac.wordpress.org/>
WordPress blogging software
More information about the wp-trac
mailing list