GD Star Rating version 1.9.7 suffers from cross site scripting and path disclosure vulnerabilities.
f317ba56bcfbe1dc8ad82983c22418ee06a8a56d68db97d325a5712c0561491b
=====================================
Vulnerability ID: HTB22843
Reference: http://www.htbridge.ch/advisory/path_disclosure_in_gd_star_rating_wordpress_plugin.html
Product: GD Star Rating wordpress plugin
Vendor: Milan Petrovic ( http://www.gdstarrating.com/ )
Vulnerable Version: 1.9.7
Vendor Notification: 08 February 2011
Vulnerability Type: Path disclosure
Status: Awaiting Vendor Solution
Risk level: Low
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)
Vulnerability Details:
The vulnerability exists due to failure in the "/wp-content/plugins/gd-star-rating/widgets/widget_top.php" script, it's possible to generate an error that will reveal the full path of the script.
A remote user can determine the full path to the web root directory and other potentially sensitive information.
The following PoC is available:
http://[host]/wp-content/plugins/gd-star-rating/widgets/widget_top.php
=====================================
Vulnerability ID: HTB22844
Reference: http://www.htbridge.ch/advisory/xss_in_gd_star_rating_wordpress_plugin.html
Product: GD Star Rating wordpress plugin
Vendor: Milan Petrovic ( http://www.gdstarrating.com/ )
Vulnerable Version: 1.9.7
Vendor Notification: 08 February 2011
Vulnerability Type: XSS (Cross Site Scripting)
Risk level: Medium
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)
Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.
The vulnerability exists due to failure in the "/wp-content/plugins/gd-star-rating/widgets/widget_top.php" script to properly sanitize user-supplied input in "wpfn" variable when register_globals is on.
Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.
The following PoC is available:
http://[host]/wp-content/plugins/gd-star-rating/widgets/widget_top.php?wpfn="><script>alert("XSS");</script>