Rating-Widget 1.3.1 Cross Site Scripting

2011-03-18T00:00:00
ID PACKETSTORM:99451
Type packetstorm
Reporter High-Tech Bridge SA
Modified 2011-03-18T00:00:00

Description

                                        
                                            `=====================================  
Vulnerability ID: HTB22891  
Reference: http://www.htbridge.ch/advisory/xss_in_rating_widget_wordpress_plugin_2.html  
Product: Rating-Widget wordpress plugin  
Vendor: Vova Feldman ( http://rating-widget.com/ )   
Vulnerable Version: 1.3.1  
Vendor Notification: 03 March 2011   
Vulnerability Type: XSS (Cross Site Scripting)  
Risk level: Medium   
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)   
  
Vulnerability Details:  
The vulnerability exists due to failure in the "/wp-content/plugins/rating-widget/view/save.php" script to properly sanitize user-supplied input in "rw_form_hidden_field_name" variable when register_globals is on.  
User can execute arbitrary JavaScript code within the vulnerable application.  
Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.  
  
The following PoC is available:  
  
  
http://[host]/wp-content/plugins/rating-widget/view/save.php?rw_form_hidden_field_name=%22%3E%3Cscript%3Ealert%28%22XSS%22%29;%3C/script%3E  
  
  
=====================================  
Vulnerability ID: HTB22890  
Reference: http://www.htbridge.ch/advisory/xss_in_rating_widget_wordpress_plugin_1.html  
Product: Rating-Widget wordpress plugin  
Vendor: Vova Feldman ( http://rating-widget.com/ )   
Vulnerable Version: 1.3.1  
Vendor Notification: 03 March 2011   
Vulnerability Type: XSS (Cross Site Scripting)  
Risk level: Medium   
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)   
  
Vulnerability Details:  
The vulnerability exists due to failure in the "/wp-content/plugins/rating-widget/view/rating.php" script to properly sanitize user-supplied input in "vars" variable when register_globals is on.  
User can execute arbitrary JavaScript code within the vulnerable application.  
Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.  
  
The following PoC is available:  
  
  
http://[host]/wp-content/plugins/rating-widget/view/rating.php?vars[type]=%22%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E  
  
  
=====================================  
Vulnerability ID: HTB22889  
Reference: http://www.htbridge.ch/advisory/xss_in_rating_widget_wordpress_plugin.html  
Product: Rating-Widget wordpress plugin  
Vendor: Vova Feldman ( http://rating-widget.com/ )   
Vulnerable Version: 1.3.1  
Vendor Notification: 03 March 2011   
Vulnerability Type: XSS (Cross Site Scripting)  
Risk level: Medium   
Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)   
  
Vulnerability Details:  
The vulnerability exists due to failure in the "/wp-content/plugins/rating-widget/view/availability_options.php" script to properly sanitize user-supplied input in "selected_key" variable when register_globals is on.  
User can execute arbitrary JavaScript code within the vulnerable application.  
Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.  
  
The following PoC is available:  
  
  
http://[host]/wp-content/plugins/rating-widget/view/availability_options.php?selected_key=%3Cscript%3Ealert%28%22XSS%22%29;%3C/script%3E  
  
  
`