[wp-trac] [WordPress Trac] #31233: HTTP Header CRLF Injection (HTTP Response Splitting) wp-login.php
WordPress Trac
noreply at wordpress.org
Wed Feb 4 17:37:10 UTC 2015
#31233: HTTP Header CRLF Injection (HTTP Response Splitting) wp-login.php
------------------------------------+-----------------------------
Reporter: roadrashtx | Owner:
Type: defect (bug) | Status: new
Priority: normal | Milestone: Awaiting Review
Component: Login and Registration | Version: 4.1
Severity: normal | Keywords:
Focuses: |
------------------------------------+-----------------------------
Our security team did some scanning of our blogs and found the following:
By using a carriage return-linefeed sequence, an attacker can add HTTP
headers to the response and completely write the body of the HTTP request.
'''Example''': http://wordpressdomain/wp-login.php?redirect_to=Content-
Type:%20multipart/related;%20boundary=_AppScan%0d%0a--_AppScan%0d
%0aContent-Location:foo%0d%0aContent-Transfer-
Encoding:base64%0d%0a%0d%0aPGh0bWw%2bPHNjcmlwdD5hbGVydCgiWFNTIik8L3NjcmlwdD48L2h0bWw%2b%0d%0a&reauth=1
'''Result''': in the source code you will see the %0D %0A (URL encoded
<CR> and <LF>) is successful injected.
<input type="hidden" name="redirect_to" value="Content-Type:
multipart/related; boundary=_AppScan
--_AppScan
Content-Location:foo
Content-Transfer-Encoding:base64
PGh0bWw+PHNjcmlwdD5hbGVydCgiWFNTIik8L3NjcmlwdD48L2h0bWw+
" />
--
Ticket URL: <https://core.trac.wordpress.org/ticket/31233>
WordPress Trac <https://core.trac.wordpress.org/>
WordPress publishing platform
More information about the wp-trac
mailing list