Update ======================== Fixed wrong dates. Details ======================== Application: HMS Testimonials ( http://wordpress.org/plugins/hms-testimonials/ ) Version: 2.0.10 Type: Wordpress Plugin Vendor: Jeff Kreitner ( http://profiles.wordpress.org/kreitje/ ) Vulnerability: - Cross-Site Request Forgery (CWE-352) - Cross-Site Scripting (CWE-79) Description ======================== Display your customer testimonials on pages or posts. Use groups to organize and display specific testimonnials on specific pages. Vulnerability ======================== This plugin is vulnerable to CSRF on all forms, as well as XSS on some of them 1. Testimonials is vulnerable to CSRF and XSS 2. Group is vulnerable to CSRF 3. Settings 3.1. Default is vulnerable to CSRF 3.2. Advanced is vulnerable to CSRF 3.3. Custom Fields is vulnerable to CSRF and XSS 3.4. Templates is vulnerable to CSRF and XSS This can be used in many different ways, like defacement of both public site and the admin area (only the HMS Testimonials plugin area will be affected), modify settings to set a lower role as moderator (very harmful on sites with open registrations), etc. Proof of Concept ======================== 1. Testimonial
2. Group
3.1. Settings - Default
3.2. Settings - Advanced
3.3. Settings - Custom Fields
3.4. Settings - Template
Solution ======================== Update to HMS Testimonials 2.0.11 Timeline ======================== 2013-09-08 - Contacted developer with details 2013-09-08 - Fix released 2013-09-08 - Disclosed public _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/