Summary
This host is installed with WordPress Contact Form Plugin and is prone to cross-site scripting vulnerability.
Impact
Successful exploitation will allow remote attacker to execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.
Impact Level: Application
Solution
No solution or patch is available as of 9th February, 2015. Information regarding this issue will be updated once the solution details are available.
For updates refer to http://www.wordpress.org/plugins/contactme
Insight
Input passed via the 'width' parameter to the xd_resize.php script is not properly sanitised before returning to the user.
Affected
WordPress Contact Form Plugin version 2.3 and prior.
Detection
Send a crafted data via HTTP GET request and check whether it is able to read cookie or not.
References
Severity
Classification
-
CVE CVE-2014-4518 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- 1024 CMS 1.1.0 Beta 'force_download.php' Local File Include Vulnerability
- Admidio get_file.php Remote File Disclosure Vulnerability
- Apache Struts CookBook/Examples Multiple Cross-Site Scripting Vulnerabilities
- Apple Safari Multiple Vulnerabilities
- Apache Web Server Configuration File Environment Variable Local Buffer Overflow Vulnerability