Summary
This host is installed with Wordpress GarageSale Plugin and is prone to cross site scripting vulnerability.
Impact
Successful exploitation will allow attacker to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.
Impact Level: Application
Solution
Upgrade to GarageSale plugin version 1.2.3 or later.
For updates refer to http://www.eibler.at/garagesale
Insight
Input passed via the 'page' HTTP GET parameter to
templates/printAdminUsersList_Footer.tpl.php script is not properly sanitised before returning to the user.
Affected
WordPress GarageSale plugin before version 1.2.3
Detection
Send a crafted data via HTTP GET request and check whether it is able to read cookie or not.
References
Severity
Classification
-
CVE CVE-2014-4532 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Abtp Portal Project 'ABTPV_BLOQUE_CENT' Parameter Local and Remote File Include Vulnerabilities
- AjaXplorer 'doc_file' Parameter Local File Disclosure Vulnerability
- Apache Struts2 'XWork' Information Disclosure Vulnerability
- A4Desk Event Calendar 'eventid' Parameter SQL Injection Vulnerability
- 2532|Gigs Directory Traversal And SQL Injection Multiple Vulnerabilities