CVE-2011-3860 - Cross-Site Scripting (XSS) vulnerability in Onedesigns Cover WP

Publication

2011-09-28

Last modification

2011-10-30

Summary

Cross-site scripting (XSS) vulnerability in the Cover WP theme before 1.6.6 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter.

Description

The ThemeCity theme for WordPress is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input.An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Solution

Currently we are not aware of any vendor-supplied patches. If you feel we are in error or if you are aware of more recent information, please mail us at: info@vumetric.com.

Exploit

Attackers can exploit this issue by enticing an unsuspecting victim to follow a malicious URI.The following example URI is available: http://www.example.com/?s=%22%3E%3Cscript%3Ealert%28%22DDz+Mr.PaPaRoSSe%22%29%3C%2Fscript%3E&submit=Search

Classification

CWE-79 - Cross-Site Scripting (XSS)

Risk level (CVSS AV:N/AC:M/Au:N/C:N/I:P/A:N)

Medium

4.3

Access Vector

  • Network
  • Adjacent Network
  • Local

Access Complexity

  • Low
  • Medium
  • High

Authentication

  • None
  • Single
  • Multiple

Confident. Impact

  • Complete
  • Partial
  • None

Integrity Impact

  • Complete
  • Partial
  • None

Affected Products

Vendor Product Versions
Onedesigns Cover WP  1.6.5 , 1.5.4 , 1.5 , 1.1 , 1.5.8 , 1.4 , 1.5.7 , 1.6.3 , 1.6.1 , 1.5.9 , 1.6.2 , 1.3 , 1.4.1 , 1.6.4 , 1.5.5 , 1.2 , 1.5.2 , 1.6 , 1.5.1 , 1.5.3 , 1.5.6