exploit the possibilities

WordPress WooCommerce 2.2.10 Cross Site Scripting

WordPress WooCommerce 2.2.10 Cross Site Scripting
Posted Feb 19, 2015
Authored by Eric Flokstra

WordPress WooCommerce plugin version 2.2.10 suffers from a cross site scripting vulnerability.

tags | exploit, xss
MD5 | 5caec7a5453c6062c82abc18a579d7ae

WordPress WooCommerce 2.2.10 Cross Site Scripting

Change Mirror Download
====================================================
Product: WooCommerce WordPress plugin
Vendor: WooThemes
Tested Version: 2.2.10
Vulnerability Type: Cross-Site Scripting [CWE-79]
Risk Level: Medium
CVSSv2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Solution Status: Solved in version 2.2.11
Discovered and Provided: Eric Flokstra - ITsec Security Services
====================================================
[-] About the Vendor:

WooCommerce is a popular open source WordPress e-commerce plugin with
around 6.2 million downloads.It is built by WooThemes and designed for
small to large-sized online merchants.

[-] Advisory Details:

The WooCommerce plugin gives users the ability to see their stores
performance from month to month using graphs and stats. However
insufficient validation on the request retrieving the reports is
performed, enabling remote execution of arbitrary scripting code in the
target's web browser. This scripting code will be executed within the
security context of the WordPress admin panel.

[-] Proof of Concept:

http://example.com/wordpress/wp-admin/admin.php?page=wc-reports&"><script>alert('ITsec')</script
<http://example.com/wordpress/wp-admin/admin.php?page=wc-reports&%E2%80%9D%3e%3cscript%3ealert%28%27ITsec%27%29%3c/script>>


[-] Disclosure Timeline:

[28 Jan 2015]: Vendor notification
[29 Jan 2015]: Vulnerability confirmation
[29 Jan 2015]: Vulnerability patched
[19 Feb 2015]: Public disclosure

[-] Solution:

Update to version 2.2.11.

[-] References:

[1] WooCommerce Changelog --
https://wordpress.org/plugins/woocommerce/changelog/
[2] Common Vulnerabilities and Exposures (CVE) -- http://cve.mitre.org
[3] Common Weakness Enumeration (CWE) -- http://cwe.mitre.org
[4] ITsec Security Services BV -- http://www.itsec.nl

------------------------------------------------------------------------
ITsec Security Services bv. (KvK. 34181927)

Postal Address:
P.O. Box 5120, 2000GC Haarlem
Visitors Address:
Kenaupark 23, 2011 MR Haarlem

Phone: +31 - (0)23 542 05 78

The information contained in this email communication is confidential and is intended solely for the use of the individual or entity to whom it is addressed and others authorized to receive it. If you are not the intended recipient, you are hereby notified that any disclosure, copying,distribution, or taking any action in reliance of the contents of this information is strictly prohibited and may be unlawful. No rights may be attached to this message. ITsec does not accept any liability for incorrect and incomplete transmission or delayed receipt of this e-mail nor for the effects or damages caused by the direct or indirect use of the information or functionality provided by this posting, nor the content contained within.Use them at your own risk.



Login or Register to add favorites

File Archive:

May 2020

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    14 Files
  • 2
    May 2nd
    3 Files
  • 3
    May 3rd
    1 Files
  • 4
    May 4th
    18 Files
  • 5
    May 5th
    15 Files
  • 6
    May 6th
    21 Files
  • 7
    May 7th
    15 Files
  • 8
    May 8th
    19 Files
  • 9
    May 9th
    1 Files
  • 10
    May 10th
    2 Files
  • 11
    May 11th
    18 Files
  • 12
    May 12th
    39 Files
  • 13
    May 13th
    15 Files
  • 14
    May 14th
    17 Files
  • 15
    May 15th
    17 Files
  • 16
    May 16th
    2 Files
  • 17
    May 17th
    2 Files
  • 18
    May 18th
    15 Files
  • 19
    May 19th
    21 Files
  • 20
    May 20th
    15 Files
  • 21
    May 21st
    15 Files
  • 22
    May 22nd
    6 Files
  • 23
    May 23rd
    1 Files
  • 24
    May 24th
    1 Files
  • 25
    May 25th
    2 Files
  • 26
    May 26th
    23 Files
  • 27
    May 27th
    7 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close