Summary
This host is installed with WordPress Facebook Promotion Generator Plugin and is prone to cross-site scripting vulnerability.
Impact
Successful exploitation will allow remote attacker to execute arbitrary script code in a user's browser session within the trust relationship between their browser and the server.
Impact Level: Application
Solution
No solution or patch is available as of 9th February, 2015. Information regarding this issue will be updated once the solution details are available.
For updates refer to http://www.wordpress.org/plugins/fbpromotions
Insight
Input passed via the 'promo_type', 'fb_edit_action', and 'promo_id' parameters to admin/swarm-settings.php script is not properly sanitised before returning to the user.
Affected
WordPress Facebook Promotion Generator Plugin version 1.3.4 and prior.
Detection
Send a crafted data via HTTP GET request and check whether it is able to read cookie or not.
References
Severity
Classification
-
CVE CVE-2014-4528 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Apache Tomcat cal2.jsp Cross Site Scripting Vulnerability
- AlienForm CGI script
- Alt-N WebAdmin Remote Source Code Information Disclosure Vulnerability
- Abtp Portal Project 'ABTPV_BLOQUE_CENT' Parameter Local and Remote File Include Vulnerabilities
- Adobe BlazeDS XML and XML External Entity Injection Vulnerabilities