Advisory

WordPress Login-with-Ajax Plugin "Callback" Cross-Site Scripting (XSS)

Dell SecureWorks Security Advisory SWRX-2012-003

Advisory Information

  • Title: WordPress login-with-ajax plugin "callback" cross-site scripting (XSS)
  • Advisory ID: SWRX-2012-003
  • Date published: Friday, May 18, 2012
  • CVE: CVE-2012-2759
  • CVSS v2 base score: 4.3
  • Date of last update: Friday, May 18, 2012
  • Vendors contacted: WordPress
  • Release mode: Coordinated
  • Discovered by: Stewart McIntyre, Dell SecureWorks

Summary

Login With Ajax is a plugin for WordPress that provides an alternate site login using AJAX. A vulnerability exists in Login With Ajax versions prior to 3.0.4.1 due to insufficient input validation affecting JSON callbacks. Successful exploitation may aid an attacker in retrieving session cookies, stealing recently submitted data, or launching further attacks.

Download the PDF

PGP Signature (PC Users: You may need to right click your mouse and select "Save As" or "Save Target As" and then open with Notepad)

SecureWorks CTU Public Key



ABOUT THE AUTHOR
COUNTER THREAT UNIT RESEARCH TEAM

Secureworks Counter Threat Unit™ (CTU) researchers frequently serve as expert resources for the media, publish technical analyses for the security community, and speak about emerging threats at security conferences. Leveraging Secureworks’ advanced security technologies and a network of industry contacts, the CTU™ research team tracks threat actors and analyzes anomalous activity, uncovering new attack techniques and threats. This process enables CTU researchers to identify threats as they emerge and develop countermeasures that protect customers before damage can occur.
Revenir aux blogs

ESSAYEZ TAEGIS DÈS AUJOURD'HUI !

Voyez par vous-même : Demandez votre démo pour voir comment Taegis peut réduire les risques, optimiser les investissements de sécurité existants et pallier la pénurie de talents.