Summary
This host is installed with Wordpress bib2html Plugin and is prone to cross site scripting vulnerability.
Impact
Successful exploitation will allow attacker to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.
Impact Level: Application
Solution
No Solution or patch is available as of 1st June, 2014. Information regarding this issue will updated once the solution details are available.
For updates refer to http://wordpress.org/plugins/bib2html
Insight
Input passed via the 'styleShortName' HTTP GET parameter to /OSBiB/create/index.php script is not properly sanitised before returning to the user.
Affected
WordPress bib2html Plugin version 0.9.3, Other versions may also be affected.
Detection
Send a crafted data via HTTP GET request and check whether it is able to read cookie or not.
References
Severity
Classification
-
CVE CVE-2014-3870 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Apache ActiveMQ Source Code Information Disclosure Vulnerability
- Adobe Presenter viewer.swf and loadflash.js XSS Vulnerability
- Apache Tomcat RemoteFilterValve Security Bypass Vulnerability
- 1024 CMS 1.1.0 Beta 'force_download.php' Local File Include Vulnerability
- Apache ActiveMQ Persistent Cross-Site Scripting Vulnerability