XSS in WPTouch wordpress plugin

2010-12-01T00:00:00
ID SECURITYVULNS:DOC:25225
Type securityvulns
Reporter Securityvulns
Modified 2010-12-01T00:00:00

Description

Vulnerability ID: HTB22698 Reference: http://www.htbridge.ch/advisory/xss_in_wptouch_wordpress_plugin.html Product: WPTouch wordpress plugin Vendor: BraveNewCode Inc ( http://www.bravenewcode.com/ ) Vulnerable Version: 1.9.19.4 Vendor Notification: 16 November 2010 Vulnerability Type: XSS (Cross Site Scripting) Status: Not Fixed, Vendor Alerted, Awaiting Vendor Response Risk level: Medium Credit: High-Tech Bridge SA - Ethical Hacking & Penetration Testing (http://www.htbridge.ch/)

Vulnerability Details: User can execute arbitrary JavaScript code within the vulnerable application.

The vulnerability exists due to failure in the "/lib/includes/auth.inc.php" script to properly sanitize user-supplied input in "wptouch_settings" variable when register_globals is On. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data.

The following PoC is available:

http://[host]/wp-content/plugins/wptouch/include/adsense-new.php?wptouch_settings[adsense-id]=%27,};//--%3E%3C/script%3E%3Cscript%3Ealert%28%27XSS%27%29;%3C/script%3E%3C!--