Description
WordPress Plugin Count per Day is prone to an arbitrary file download and a cross-site scripting vulnerability because it fails to sufficiently verify and sanitize user-supplied data. Attackers may leverage these issues to download arbitrary files in the context of the webserver process and execute arbitrary HTML and script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks. WordPress Plugin Count per Day versions prior to 3.1.1 are vulnerable.
Remediation
Update to plugin version 3.1.1 or latest
References
http://www.securityfocus.com/bid/51402/exploit
http://www.exploit-db.com/exploits/18355/
http://packetstormsecurity.com/files/108631/countperday-downloadxss.txt
Related Vulnerabilities
phpMyFAQ Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2010-4558)
Ruby on Rails CVE-2024-28103 Vulnerability (CVE-2024-28103)
WordPress Plugin Olevmedia Shortcodes Multiple Cross-Site Scripting Vulnerabilities (1.1.9)
WordPress Plugin Navis DocumentCloud Cross-Site Scripting (0.1)