WordPress WP-Table Reloaded模块跨站脚本漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1121508 漏洞类型 跨站脚本
发布时间 2013-01-24 更新时间 2013-02-18
CVE编号 CVE-2013-1463 CNNVD-ID CNNVD-201302-145
漏洞平台 PHP CVSS评分 4.3
|漏洞来源
https://www.exploit-db.com/exploits/38251
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201302-145
|漏洞详情
WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress平台上的WP-TableReloaded模块1.9.4之前版本中的js/tabletools/zeroclipboard.swf中存在跨站脚本漏洞。远程攻击者可通过id参数利用该漏洞注入任意网页脚本或HTML代码。
|漏洞EXP
source: http://www.securityfocus.com/bid/57664/info

The WP-Table Reloaded plugin for WordPress is prone to a cross-site scripting vulnerability.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

WP-Table Reloaded versions prior to 1.9.4 are vulnerable. 

http://www.example.com/wp-content/plugins/wp-table-reloaded/js/tabletools/zeroclipboard.swf?id=a\%22%29%29}catch%28e%29{alert%281%29}//
|参考资料

来源:tobias.baethge.com
链接:http://tobias.baethge.com/2013/01/maintenance-release-wp-table-reloaded-1-9-4/
来源:XF
名称:wptablereloaded-zeroclipboard-xss(81748)
链接:http://xforce.iss.net/xforce/xfdb/81748
来源:BID
名称:57664
链接:http://www.securityfocus.com/bid/57664
来源:SECUNIA
名称:52027
链接:http://secunia.com/advisories/52027
来源:packetstormsecurity.com
链接:http://packetstormsecurity.com/files/119968/WordPress-WP-Table-Reloaded-Cross-Site-Scripting.html
来源:OSVDB
名称:89754
链接:http://osvdb.org/89754