Wordpress WooCommerce Plugin 2.0.17 Cross-Site Scripting Vulnerability
Title: Wordpress WooCommerce Plugin 2.0.17 Cross-Site Scripting Vulnerability
Advisory ID: ZSL-2013-5156
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 18.10.2013
Apache 2.4.2 (Win32)
PHP 5.4.7
MySQL 5.5.25a
[17.10.2013] Vendor contacted.
[17.10.2013] Vendor responds asking more details.
[17.10.2013] Sent details to the vendor.
[18.10.2013] Vendor releases a patch for this issue that will be included in the 2.0.18 release.
[18.10.2013] Coordinated public security advisory released.
Figh hive to teppei
[2] http://cxsecurity.com/issue/WLB-2013100127
[3] http://packetstormsecurity.com/files/123684
[4] http://www.osvdb.org/show/osvdb/98754
[5] http://www.securityfocus.com/bid/63228
[6] http://wordpress.org/plugins/woocommerce/changelog/
[7] http://wordpress.org/support/topic/cross-site-scripting-vulnerability-warning
[8] http://xforce.iss.net/xforce/xfdb/88169
[9] https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/woocommerce/woocommerce-2017-cross-site-scripting
[21.10.2013] - Added reference [4] and [5]
[22.10.2013] - Added reference [6] and [7]
[27.10.2013] - Added reference [8]
[16.12.2022] - Added reference [9]
Web: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk
Advisory ID: ZSL-2013-5156
Type: Local/Remote
Impact: Cross-Site Scripting
Risk: (3/5)
Release Date: 18.10.2013
Summary
WooCommerce is an open source e-commerce plugin for WordPress.Description
The plugin suffers from a XSS issue due to a failure to properly sanitize user-supplied input to the 'hide-wc-extensions-message' parameter in the 'admin/woocommerce-admin-settings.php' script. Attackers can exploit this weakness to execute arbitrary HTML and script code in a user's browser session.Vendor
WooThemes - http://www.woothemes.comAffected Version
2.0.17 and 2.0.14Tested On
Microsoft Windows 7 Ultimate SP1 (EN)Apache 2.4.2 (Win32)
PHP 5.4.7
MySQL 5.5.25a
Vendor Status
[13.10.2013] Vulnerability discovered.[17.10.2013] Vendor contacted.
[17.10.2013] Vendor responds asking more details.
[17.10.2013] Sent details to the vendor.
[18.10.2013] Vendor releases a patch for this issue that will be included in the 2.0.18 release.
[18.10.2013] Coordinated public security advisory released.
PoC
woocommerce_xss.txtCredits
Vulnerability discovered by Gjoko Krstic - <gjoko@zeroscience.mk>Figh hive to teppei
References
[1] https://github.com/woothemes/woocommerce/commit/4b581450480d74667b76d6ba50961d79a6d7a0c1[2] http://cxsecurity.com/issue/WLB-2013100127
[3] http://packetstormsecurity.com/files/123684
[4] http://www.osvdb.org/show/osvdb/98754
[5] http://www.securityfocus.com/bid/63228
[6] http://wordpress.org/plugins/woocommerce/changelog/
[7] http://wordpress.org/support/topic/cross-site-scripting-vulnerability-warning
[8] http://xforce.iss.net/xforce/xfdb/88169
[9] https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/woocommerce/woocommerce-2017-cross-site-scripting
Changelog
[18.10.2013] - Initial release[21.10.2013] - Added reference [4] and [5]
[22.10.2013] - Added reference [6] and [7]
[27.10.2013] - Added reference [8]
[16.12.2022] - Added reference [9]
Contact
Zero Science LabWeb: http://www.zeroscience.mk
e-mail: lab@zeroscience.mk