WordPress GD bbPress Attachments 2.1 Cross Site Scripting

Type packetstorm
Reporter Tom Adams
Modified 2015-07-12T00:00:00


Software: GD bbPress Attachments  
Version: 2.1  
Homepage: http://wordpress.org/plugins/gd-bbpress-attachments/  
Advisory report: https://security.dxw.com/advisories/reflected-xss-in-gd-bbpress-attachments-allows-an-attacker-to-do-almost-anything-an-admin-can/  
CVE: Awaiting assignment  
CVSS: 5.8 (Medium; AV:N/AC:M/Au:N/C:P/I:P/A:N)  
Reflected XSS in GD bbPress Attachments allows an attacker to do almost anything an admin can  
This plugin outputs the value of $_GET[‘tab’] without escaping (see forms/panels.php lines 3 and 39). An attacker could easily construct an URL which performs virtually any action an admin is able to perform, including creating/deleting users/posts, injecting malicious HTML into user-facing pages, or editing PHP files (if that feature hasn’t been disabled).  
Proof of concept  
Visit the following URL in a browser with no reflected XSS protection (i.e. Firefox or older versions of IE):  
Upgrade to version 2.3 or later  
Disclosure policy  
dxw believes in responsible disclosure. Your attention is drawn to our disclosure policy: https://security.dxw.com/disclosure/  
Please contact us on security@dxw.com to acknowledge this report if you received it via a third party (for example, plugins@wordpress.org) as they generally cannot communicate with us on your behalf.  
This vulnerability will be published if we do not receive a response to this report with 14 days.  
2015-02-25: Discovered  
2015-07-01: Reported to vendor via email form on https://www.dev4press.com/contact/  
2015-07-01: Requested CVE  
2015-07-01: Vendor responded  
2015-07-04: Vendor confirmed fixed  
2015-07-08: Published  
Discovered by dxw:  
Tom Adams  
Please visit security.dxw.com for more information.