Summary
This host is installed with Wordpress Recommend to a friend plugin and is prone to cross site scripting vulnerability.
Impact
Successful exploitation will allow attacker to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.
Impact Level: Application
Solution
No Solution or patch is available as of 30th December, 2013. Information regarding this issue will be updated once the solution details are available.
For updates refer to http://wordpress.org/plugins/recommend-a-friend
Insight
Flaw is due to an improper validation of user supplied input to the 'current_url' parameter in 'raf_form.php' script.
Affected
WordPress Recommend to a friend Plugin version 2.0.2, Other versions may also be affected.
Detection
Send a crafted data via HTTP GET request and check whether it is able to read cookie or not.
References
Severity
Classification
-
CVE CVE-2013-7276 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Abtp Portal Project 'ABTPV_BLOQUE_CENT' Parameter Local and Remote File Include Vulnerabilities
- Apache ActiveMQ Source Code Information Disclosure Vulnerability
- @Mail WebMail Email Body HTML Injection Vulnerability
- Adobe BlazeDS XML and XML External Entity Injection Vulnerabilities
- Admidio get_file.php Remote File Disclosure Vulnerability