CVE-2009-1030 : Detail

CVE-2009-1030

Cross-site Scripting
A03-Injection
0.44%V3
Network
2009-03-19
23h00 +00:00
2018-10-10
16h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Cross-site scripting (XSS) vulnerability in the choose_primary_blog function in wp-includes/wpmu-functions.php in WordPress MU (WPMU) before 2.7 allows remote attackers to inject arbitrary web script or HTML via the HTTP Host header.

CVE Informations

Related Weaknesses

CWE-ID Weakness Name Source
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Metrics

Metrics Score Severity CVSS Vector Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Exploit information

Exploit Database EDB-ID : 8196

Publication date : 2009-03-09 23h00 +00:00
Author : Juan Galiana Lara
EDB Verified : Yes

============================================= INTERNET SECURITY AUDITORS ALERT 2009-004 - Original release date: December 3rd, 2008 - Last revised: March 10th, 2009 - Discovered by: Juan Galiana Lara - Severity: 6.3/10 (CVSS scored) ============================================= I. VULNERABILITY ------------------------- WordPress MU < 2.7 'Host' HTTP Header Cross Site Scripting (XSS) Vulnerability II. BACKGROUND ------------------------- WordPress MU, or multi-user, allows to run unlimited blogs with a single install of wordpress. It is most famously used for WordPress.com where it serves tens of millions of hits on hundreds of thousands of blogs each day. Also is used in many other sites like Harvard University and Le Monde. III. DESCRIPTION ------------------------- WordPress MU prior to version 2.7 fails to sanitize the Host header correctly in choose_primary_blog function and is therefore prune to XSS attacks. Web Sites running in a name based virtual hosting setup are not affected while they are not the default virtual host. IV. PROOF OF CONCEPT ------------------------- The snippet of vulnerable code: In wp-includes/wpmu-functions.php, concretly in the function choose_primary_blog: 1830 function choose_primary_blog() { 1831 global $current_user; 1832 ?> 1833 <table class="form-table"> 1834 <tr> 1835 <th scope="row"><?php _e('Primary Blog'); ?></th> 1836 <td> 1837 <?php 1838 $all_blogs = get_blogs_of_user( $current_user->ID ); 1839 if( count( $all_blogs ) > 1 ) { 1840 $primary_blog = get_usermeta($current_user->ID, 'primary_blog'); 1841 ?> 1842 <select name="primary_blog"> 1843 <?php foreach( (array) $all_blogs as $blog ) { ?> 1844 <option value='<?php echo $blog->userblog_id ?>'<?php if( $primary_blog == $blog->userblog_id ) echo ' selected="selected"' ?>>http://<?php echo $blog->domain.$blog->path ?></option> 1845 <?php } ?> 1846 </select> 1847 <?php 1848 } else { 1849 echo $_SERVER['HTTP_HOST']; <- HERE 1850 } 1851 ?> 1852 </td> 1853 </tr> 1854 </table> 1855 <?php 1856 } The line 1849 contains the affected code "echo $_SERVER['HTTP_HOST'];" and is possible to inject HTML and script code crafting HTTP Host header: PoC: $ curl -H "Cookie: my cookies here" -H "Host: <body onload=alert(String.fromCharCode(88,83,83))>" http://www.example.com/wp-admin/profile.php> tmp.html $ firefox tmp.html The javascript code will be executed in the context of the victim browser, this can be exploited to steal cookies and escalate privileges to administrator. Tested with Wordpress MU 2.6.5, Apache 2.2 and Mozilla Firefox 3.0.6 V. BUSINESS IMPACT ------------------------- The impact is the attacker can gain administrator privileges on the application. VI. SYSTEMS AFFECTED ------------------------- Versions prior to 2.7 are affected VII. SOLUTION ------------------------- Upgrade to version 2.7 of wordpress multi-user. It can be downloaded from http://mu.wordpress.org VIII. REFERENCES ------------------------- http://mu.wordpress.org IX. CREDITS ------------------------- This vulnerability has been discovered by Juan Galiana Lara (jgaliana (at) isecauditors (dot) com). X. REVISION HISTORY ------------------------- December 03, 2008: Initial release March 02, 2009: More details added XI. DISCLOSURE TIMELINE ------------------------- December 03, 2008: Vendor contacted December 03, 2008: MU trunk code fixed January 28, 2008: WordPress MU 2.7 released March 10, 2009: Vulnerability published by Internet Security Auditors (www.isecauditors.com) XII. LEGAL NOTICES ------------------------- The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Internet Security Auditors accepts no responsibility for any damage caused by the use or misuse of this information. # milw0rm.com [2009-03-10]

Products Mentioned

Configuraton 0

Wordpress>>Wordpress_mu >> Version To (including) 2.6

Wordpress>>Wordpress_mu >> Version 1.0

    Wordpress>>Wordpress_mu >> Version 1.0

      Wordpress>>Wordpress_mu >> Version 1.0

        Wordpress>>Wordpress_mu >> Version 1.0

          Wordpress>>Wordpress_mu >> Version 1.0

            Wordpress>>Wordpress_mu >> Version 1.1

            Wordpress>>Wordpress_mu >> Version 1.1.1

            Wordpress>>Wordpress_mu >> Version 1.2

            Wordpress>>Wordpress_mu >> Version 1.2.1

            Wordpress>>Wordpress_mu >> Version 1.2.2

            Wordpress>>Wordpress_mu >> Version 1.2.3

            Wordpress>>Wordpress_mu >> Version 1.2.4

            Wordpress>>Wordpress_mu >> Version 1.2.4

              Wordpress>>Wordpress_mu >> Version 1.2.5a

                Wordpress>>Wordpress_mu >> Version 1.3

                Wordpress>>Wordpress_mu >> Version 1.3.1

                  Wordpress>>Wordpress_mu >> Version 1.3.2

                  Wordpress>>Wordpress_mu >> Version 1.3.3

                  Wordpress>>Wordpress_mu >> Version 1.5

                    Wordpress>>Wordpress_mu >> Version 1.5.1

                    Wordpress>>Wordpress_mu >> Version 2.6.1

                    Wordpress>>Wordpress_mu >> Version 2.6.2

                    Wordpress>>Wordpress_mu >> Version 2.6.3

                    Wordpress>>Wordpress_mu >> Version 2.6.5

                    Wordpress>>Wordpress_mu >> Version 2.7

                    References

                    http://www.securityfocus.com/bid/34075
                    Tags : vdb-entry, x_refsource_BID
                    http://www.securitytracker.com/id?1021838
                    Tags : vdb-entry, x_refsource_SECTRACK
                    http://marc.info/?l=bugtraq&m=126996727024732&w=2
                    Tags : vendor-advisory, x_refsource_HP
                    https://www.exploit-db.com/exploits/8196
                    Tags : exploit, x_refsource_EXPLOIT-DB
                    http://marc.info/?l=bugtraq&m=126996727024732&w=2
                    Tags : vendor-advisory, x_refsource_HP