Summary
This host is installed with Wordpress Js External link plugin and is prone to xss vulnerability.
Impact
Successful exploitation will allow attacker to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.
Impact Level: Application
Solution
No solution or patch is available as of 20th February, 2015. Information regarding this issue will be updated once the solution details are available.
For updates refer to http://wordpress.org/plugins
Insight
Input passed via the 'blog' GET parameter to 'redirect.php' script is not properly sanitized before being returned to the user.
Affected
WordPress JS External Link Info Plugin version 1.21, Other versions may also be affected.
Detection
Send a crafted data via HTTP GET request and check whether it is able to read cookie or not.
References
Updated on 2017-03-28
Severity
Classification
-
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Apache Rave User Information Disclosure Vulnerability
- 1024 CMS 1.1.0 Beta 'force_download.php' Local File Include Vulnerability
- Ampache Reflected Cross Site Scripting Vulnerability
- Apache Struts2/XWork Remote Command Execution Vulnerability
- APC PowerChute Network Shutdown 'security/applet' Cross Site Scripting Vulnerability