WordPress White Label CMS Plugin HTML Injection and Cross Site Request Forgery Vulnerabilities
28 Oct. 2012
Summary
White Label CMS plugin for WordPress is prone to an HTML-injection vulnerability and a cross-site request-forgery vulnerability because it fails to properly sanitize user-supplied input.
Credit:
The information has been provided by pcsjj.
Vulnerable Systems:
* White Label CMS 1.5 and prior
Exploiting these issues may allow a remote attacker to perform certain administrative actions, gain unauthorized access to the affected application, execute arbitrary script or HTML code within the context of the browser, and steal cookie-based authentication credentials. Other attacks are also possible.
An attacker can exploit HTML-injection issues through a browser. To exploit the cross-site request-forgery issue the attacker must entice an unsuspecting victim into viewing a malicious webpage.
The following exploit is available:
<html>
<title>White Label CMS CSRF</title>
<body>
<img src='http://www.example.com/wordpress/wp-admin/admin.php?page=wlcms-plugin.php&action=save&wlcms_o_developer_name="><script>alert("fun")</script><div"'>
</body>
</html>