CVE-2009-1030 : Détail

CVE-2009-1030

Cross-site Scripting
A03-Injection
0.44%V3
Network
2009-03-19
23h00 +00:00
2018-10-10
16h57 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Cross-site scripting (XSS) vulnerability in the choose_primary_blog function in wp-includes/wpmu-functions.php in WordPress MU (WPMU) before 2.7 allows remote attackers to inject arbitrary web script or HTML via the HTTP Host header.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V2 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 8196

Date de publication : 2009-03-09 23h00 +00:00
Auteur : Juan Galiana Lara
EDB Vérifié : Yes

============================================= INTERNET SECURITY AUDITORS ALERT 2009-004 - Original release date: December 3rd, 2008 - Last revised: March 10th, 2009 - Discovered by: Juan Galiana Lara - Severity: 6.3/10 (CVSS scored) ============================================= I. VULNERABILITY ------------------------- WordPress MU < 2.7 'Host' HTTP Header Cross Site Scripting (XSS) Vulnerability II. BACKGROUND ------------------------- WordPress MU, or multi-user, allows to run unlimited blogs with a single install of wordpress. It is most famously used for WordPress.com where it serves tens of millions of hits on hundreds of thousands of blogs each day. Also is used in many other sites like Harvard University and Le Monde. III. DESCRIPTION ------------------------- WordPress MU prior to version 2.7 fails to sanitize the Host header correctly in choose_primary_blog function and is therefore prune to XSS attacks. Web Sites running in a name based virtual hosting setup are not affected while they are not the default virtual host. IV. PROOF OF CONCEPT ------------------------- The snippet of vulnerable code: In wp-includes/wpmu-functions.php, concretly in the function choose_primary_blog: 1830 function choose_primary_blog() { 1831 global $current_user; 1832 ?> 1833 <table class="form-table"> 1834 <tr> 1835 <th scope="row"><?php _e('Primary Blog'); ?></th> 1836 <td> 1837 <?php 1838 $all_blogs = get_blogs_of_user( $current_user->ID ); 1839 if( count( $all_blogs ) > 1 ) { 1840 $primary_blog = get_usermeta($current_user->ID, 'primary_blog'); 1841 ?> 1842 <select name="primary_blog"> 1843 <?php foreach( (array) $all_blogs as $blog ) { ?> 1844 <option value='<?php echo $blog->userblog_id ?>'<?php if( $primary_blog == $blog->userblog_id ) echo ' selected="selected"' ?>>http://<?php echo $blog->domain.$blog->path ?></option> 1845 <?php } ?> 1846 </select> 1847 <?php 1848 } else { 1849 echo $_SERVER['HTTP_HOST']; <- HERE 1850 } 1851 ?> 1852 </td> 1853 </tr> 1854 </table> 1855 <?php 1856 } The line 1849 contains the affected code "echo $_SERVER['HTTP_HOST'];" and is possible to inject HTML and script code crafting HTTP Host header: PoC: $ curl -H "Cookie: my cookies here" -H "Host: <body onload=alert(String.fromCharCode(88,83,83))>" http://www.example.com/wp-admin/profile.php> tmp.html $ firefox tmp.html The javascript code will be executed in the context of the victim browser, this can be exploited to steal cookies and escalate privileges to administrator. Tested with Wordpress MU 2.6.5, Apache 2.2 and Mozilla Firefox 3.0.6 V. BUSINESS IMPACT ------------------------- The impact is the attacker can gain administrator privileges on the application. VI. SYSTEMS AFFECTED ------------------------- Versions prior to 2.7 are affected VII. SOLUTION ------------------------- Upgrade to version 2.7 of wordpress multi-user. It can be downloaded from http://mu.wordpress.org VIII. REFERENCES ------------------------- http://mu.wordpress.org IX. CREDITS ------------------------- This vulnerability has been discovered by Juan Galiana Lara (jgaliana (at) isecauditors (dot) com). X. REVISION HISTORY ------------------------- December 03, 2008: Initial release March 02, 2009: More details added XI. DISCLOSURE TIMELINE ------------------------- December 03, 2008: Vendor contacted December 03, 2008: MU trunk code fixed January 28, 2008: WordPress MU 2.7 released March 10, 2009: Vulnerability published by Internet Security Auditors (www.isecauditors.com) XII. LEGAL NOTICES ------------------------- The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Internet Security Auditors accepts no responsibility for any damage caused by the use or misuse of this information. # milw0rm.com [2009-03-10]

Products Mentioned

Configuraton 0

Wordpress>>Wordpress_mu >> Version To (including) 2.6

Wordpress>>Wordpress_mu >> Version 1.0

    Wordpress>>Wordpress_mu >> Version 1.0

      Wordpress>>Wordpress_mu >> Version 1.0

        Wordpress>>Wordpress_mu >> Version 1.0

          Wordpress>>Wordpress_mu >> Version 1.0

            Wordpress>>Wordpress_mu >> Version 1.1

            Wordpress>>Wordpress_mu >> Version 1.1.1

            Wordpress>>Wordpress_mu >> Version 1.2

            Wordpress>>Wordpress_mu >> Version 1.2.1

            Wordpress>>Wordpress_mu >> Version 1.2.2

            Wordpress>>Wordpress_mu >> Version 1.2.3

            Wordpress>>Wordpress_mu >> Version 1.2.4

            Wordpress>>Wordpress_mu >> Version 1.2.4

              Wordpress>>Wordpress_mu >> Version 1.2.5a

                Wordpress>>Wordpress_mu >> Version 1.3

                Wordpress>>Wordpress_mu >> Version 1.3.1

                  Wordpress>>Wordpress_mu >> Version 1.3.2

                  Wordpress>>Wordpress_mu >> Version 1.3.3

                  Wordpress>>Wordpress_mu >> Version 1.5

                    Wordpress>>Wordpress_mu >> Version 1.5.1

                    Wordpress>>Wordpress_mu >> Version 2.6.1

                    Wordpress>>Wordpress_mu >> Version 2.6.2

                    Wordpress>>Wordpress_mu >> Version 2.6.3

                    Wordpress>>Wordpress_mu >> Version 2.6.5

                    Wordpress>>Wordpress_mu >> Version 2.7

                    Références

                    http://www.securityfocus.com/bid/34075
                    Tags : vdb-entry, x_refsource_BID
                    http://www.securitytracker.com/id?1021838
                    Tags : vdb-entry, x_refsource_SECTRACK
                    http://marc.info/?l=bugtraq&m=126996727024732&w=2
                    Tags : vendor-advisory, x_refsource_HP
                    https://www.exploit-db.com/exploits/8196
                    Tags : exploit, x_refsource_EXPLOIT-DB
                    http://marc.info/?l=bugtraq&m=126996727024732&w=2
                    Tags : vendor-advisory, x_refsource_HP