Mingle Forum WordPress plugin version 1.0.28 suffers from cross site scripting and path disclosure vulnerabilities.
77e1d1a7404be9664728b2c966c2bef18b65b04543fe9c26c9a19e9d56b6ebf8
==================================
Vulnerability ID: HTB22849
Reference: http://www.htbridge.ch/advisory/path_disclosure_in_mingle_forum_wordpress_plugin.html
Product: Mingle Forum wordpress plugin
Vendor: Cartpauj ( http://cartpauj.com/ )
Vulnerable Version: 1.0.28
Vendor Notification: 15 February 2011
Vulnerability Type: Path disclosure
Risk level: Low
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)
Vulnerability Details:
The vulnerability exists due to failure in the "/wp-content/plugins/mingle-forum/fs-admin/wpf-*.php" scripts, it's possible to generate an error that will reveal the full path of the script.
A remote user can determine the full path to the web root directory and other potentially sensitive information.
The following PoC is available:
http://[host]/wp-content/plugins/mingle-forum/fs-admin/wpf-usergroup-edit.php
http://[host]/wp-content/plugins/mingle-forum/fs-admin/wpf-add-group.php
http://[host]/wp-content/plugins/mingle-forum/fs-admin/wpf-add-forum.php
http://[host]/wp-content/plugins/mingle-forum/fs-admin/wpf-moderator.php
==================================
Vulnerability ID: HTB22848
Reference: http://www.htbridge.ch/advisory/xss_in_mingle_forum_wordpress_plugin.html
Product: Mingle Forum wordpress plugin
Vendor: Cartpauj ( http://cartpauj.com/ )
Vulnerable Version: 1.0.28
Vendor Notification: 15 February 2011
Vulnerability Type: XSS (Cross Site Scripting)
Risk level: Medium
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)
Vulnerability Details:
User can execute arbitrary JavaScript code within the vulnerable application.
Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.
The following PoC BBcode is available:
[img][url]onerror=javascript:alert(document.cookie);"'[/url][/img]