what you don't know can hurt you

WordPress YouTube Embed 3.3.2 Cross Site Scripting

WordPress YouTube Embed 3.3.2 Cross Site Scripting
Posted Aug 26, 2015

WordPress YouTube Embed plugin version 3.3.2 suffers from a stored cross site scripting vulnerability.

tags | exploit, xss
advisories | CVE-2015-6535
MD5 | b337a0d202939c3829cb9a4f4256ceea

WordPress YouTube Embed 3.3.2 Cross Site Scripting

Change Mirror Download

Details
================
Software: YouTube Embed
Version: 3.3.2
Homepage: https://wordpress.org/plugins/youtube-embed/
CVE ID: CVE-2015-6535 (Pending)
CWE ID: CWE-79
CVSS: 5.5 (Medium; AV:N/AC:L/Au:S/C:P/I:P/A:N)

Description
================
A stored XSS vulnerability in YouTube Embed 3.3.2 (and possibly earlier versions) allows admin users to compromise other admins and super admins.

YouTube Embed is a WordPress plugin with over 30,000 active installs.

Vulnerability
================
Admins on multisite installs can inject arbitrary JavaScript into pages visible to super admins via the plugin's unsanitized profile name field.

Note: Admins on multisite installs lack the unfiltered_html capability – only super admins can enter unfiltered html [2].

>From youtube-embed/includes/options-profiles.php:

31: $options[ 'name' ] = $_POST[ 'youtube_embed_name' ];

95: echo '<div class="updated fade"><p><strong>' . __( $options[ 'name' ].' Profile Saved.' ) . "</strong></p></div>\n";

Proof of concept
================
1. As an admin user authorized for plugins, go to the YouTube Embed Profiles page.
2. Choose a profile from the drop down list on the right and click 'Change profile'.
3. Enter an XSS payload (e.g. <script>alert(1)</script>) into the 'Profile name' field.
4. Log out and log in as a super admin or a different admin.
5. Navigate to the YouTube Embed Options page.

This has been tested with Firefox 38.2.0 on Debian.

Mitigation
================
Upgrade the plugin to version 3.3.3 or later.

Timeline
================
2015-08-19: Discovered
2015-08-19: Requested vulnerability reporting instructions via vendor support form
2015-08-20: Vendor asked that vulnerability be reported on the vendor's website plugin page
2015-08-20: Reported to vendor via plugin page
2015-08-20: Requested CVE number
2015-08-23: Vendor released version 3.3.3 – confirmed fixed
2015-08-26: Public Disclosure

References
================
[1] https://wordpress.org/plugins/youtube-embed/changelog/
[2] https://codex.wordpress.org/Roles_and_Capabilities#Additional_Admin_Capabilities
Login or Register to add favorites

File Archive:

December 2021

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    18 Files
  • 2
    Dec 2nd
    11 Files
  • 3
    Dec 3rd
    23 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    13 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2020 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close