#1686 closed defect (bug) (fixed)
CSS Security Vulnerability
Reported by: | hendry | Owned by: | ryan |
---|---|---|---|
Milestone: | Priority: | normal | |
Severity: | normal | Version: | 1.5.2 |
Component: | Administration | Keywords: | security |
Focuses: | Cc: |
Description
Contains Patch:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=328909
A cross site scripting vulnerability exists in Wordpress, the vulnerability
manifests itself only when viewed by IE, as Mozilla converts < in the URL to
<
By noamr@…
Change History (8)
#3
@
19 years ago
Ryan do you have an email?
I am finding it a complete pain in the arse having to act as a "copy and paste" intermediary between Noam and this BTS.
I am not sure how to update that site, but here is one example: http://www.fuegodesigns.com/blog/?%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E If you access the above URL using Mozilla/IE you won't get anything to trigger BUT, the source HTML will include: <a href="http://www.fuegodesigns.com/blog/?%22%3E%3Cscript%3Ealert(document.cookie)%3C/script%3E&paged=2">Next Page »</a></span> Accessing this URL via IE: http://www.fuegodesigns.com/blog/?"><script>alert(document.cookie)</script> Will return in IE the following HTML source: a href="http://www.fuegodesigns.com/blog/?\"><script>alert(document.cookie)</script>&paged=2">Next Page On 9/23/05, Kai Hendry <hendry@iki.fi> wrote: > On 2005-09-23T08:42+0200 Noam Rathaus wrote: > > The problem is that wordpress embeds the data sent from the user > > inside the response.
#4
@
19 years ago
So, basically, a user with high enough privileges to mess with your system can mess with your system?
Would filtering the URL with wp_specialchars() fix this "bug"?
#5
@
19 years ago
Noam writes:
Anyone sending you a link to the blog web site with the cross site scripting code will get you to execute the code. As this HTML/Javascript code can do practically anything, for example promote you to administrator of the blog, the code can be pretty dangerous. Yes wp_spericalchars() would fix it, as it would encode at the very least the < and > into < and gt;.
Does this BTS have some sort of email interface? :/
Note: See
TracTickets for help on using
tickets.
This doesn't make any sense. Maybe a sample exploit would clarify what the actual bug is?