Summary
This host is installed with Wordpress Js-Multi-Hotel plugin and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attacker to execute arbitrary HTML and script code in a user's browser session in the context of an affected site, and cause a denial of service via CPU consumption.
Impact Level: System/Application
Solution
No solution or patch is available as of 20th February, 2015. Information regarding this issue will be updated once the solution details are available.
For updates refer to http://www.joomlaskin.it
Insight
Multiple flaws are due to,
- Input passed via the 'file' parameter show_image.php and 'path' parameter to delete_img.php are not properly sanitized before being returned to the user.
- The /functions.php, /myCalendar.php, /refreshDate.php, /show_image.php, /widget.php, /phpthumb/GdThumb.inc.php, /phpthumb/thumb_plugins/gd_reflection.inc.php, and /includes/timthumb.php scripts discloses the software's installation path.
Affected
WordPress JS MultiHotel Plugin version 2.2.1, Other versions may also be affected.
Detection
Send a crafted data via HTTP GET request and check whether it is able to read cookie or not.
References
Severity
Classification
-
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Apache Struts2 Showcase Skill Name Remote Code Execution Vulnerability
- Apple Safari PDF Javascript Security Bypass Bypass Vulnerability
- Alcatel-Lucent OmniPCX Enterprise Remote Command Execution Vulnerability
- Acidcat CMS Multiple Vulnerabilities
- Ajax File and Image Manager 'data.php' PHP Code Injection Vulnerability