WordPress templates.php file Variable XSS

ID OSVDB:31578
Type osvdb
Reporter David Kierznowski()
Modified 2006-12-27T00:00:00


Vulnerability Description

WordPress contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'file' variable upon submission to the 'templates.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 2.0.6 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

WordPress templates.php file Variable XSS

Manual Testing Notes

http://downloads.securityfocus.com/vulnerabilities/exploits/21782-Recover.html http://downloads.securityfocus.com/vulnerabilities/exploits/21782-Inject.html


Vendor Specific News/Changelog Entry: http://trac.wordpress.org/changeset/4665 Secunia Advisory ID:23587 Secunia Advisory ID:23741 Other Advisory URL: http://michaeldaw.org/md-hacks/wordpress-persistent-xss Other Advisory URL: http://www.gentoo.org/security/en/glsa/glsa-200701-10.xml Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2006-12/0456.html Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2006-12/0473.html Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2006-12/0476.html ISS X-Force ID: 31133 FrSIRT Advisory: ADV-2006-5191 CVE-2006-6808 Bugtraq ID: 21782