Advisory

WordPress Login-with-Ajax Plugin "Callback" Cross-Site Scripting (XSS)

Dell SecureWorks Security Advisory SWRX-2012-003

Advisory Information

  • Title: WordPress login-with-ajax plugin "callback" cross-site scripting (XSS)
  • Advisory ID: SWRX-2012-003
  • Date published: Friday, May 18, 2012
  • CVE: CVE-2012-2759
  • CVSS v2 base score: 4.3
  • Date of last update: Friday, May 18, 2012
  • Vendors contacted: WordPress
  • Release mode: Coordinated
  • Discovered by: Stewart McIntyre, Dell SecureWorks

Summary

Login With Ajax is a plugin for WordPress that provides an alternate site login using AJAX. A vulnerability exists in Login With Ajax versions prior to 3.0.4.1 due to insufficient input validation affecting JSON callbacks. Successful exploitation may aid an attacker in retrieving session cookies, stealing recently submitted data, or launching further attacks.

Download the PDF

PGP Signature (PC Users: You may need to right click your mouse and select "Save As" or "Save Target As" and then open with Notepad)

SecureWorks CTU Public Key



ABOUT THE AUTHOR
カウンター・スレット・ユニット・リサーチチーム

The Secureworks Counter Threat Unit™ (CTU) is a dedicated threat research team that analyzes threat data across our global customer base and actively monitors the threat landscape.
ブログ記事一覧ページに戻る

今すぐ Taegis を試す

ご確認ください。 Taegis がどのようにリスクを軽減し、既存のセキュリティ投資を最適化し、人材不足を解消ことができるかをデモでご覧ください。