Network Security
Time spent: X hours spent in total
Objective: Find, analyze, recreate, and document five vulnerabilities affecting an old version of WordPress
- (Required) Authenticated Shortcode Tags Cross-Site Scripting (XSS)
- Summary: Vulnerable to a cross-site scripting vulnerability when processing shortcode tags. Inserting a caption in a post/page with the javascript works.
- Vulnerability types: XSS
- Tested in version: 4.2
- Fixed in version: 4.2.5
- GIF Walkthrough:
- Steps to recreate: Create a post or page. Click on text instead of visual and insert a caption with the XSS attack. I used an alert.
TEST!!![caption width="1" caption='<a href="' ">]<a href="http://onMouseOver='alert(2)'">Click me</a>
- Affected source code:
- (Required) Unauthenticated Stored XSS
-
Summary: Created a cross site scripting attack using a window alert in the comments section.
- Vulnerability types: XSS
- Tested in version: 4.2
- Fixed in version: 4.2.1
-
Steps to recreate: Post a reply on one of the pages. Insert javascript for alert:
<a title='x onmouseover=alert(unescape(/hello%20world/.source)) style=position:absolute;left:0;top:0;width:5000px;height:5000px AAAAAAAAAAAA...[64 kb]..AAA'></a>
and make sure message is bigger than 64kb. Then when submitted, an alert box should appear. -
Affected source code:
- (Required) Authenticated Cross-Site Scripting (XSS) via Media File Metadata
- Summary: XSS vulnerability when uploading audio files. Attacker can upload malicious mp3 files which can be executed when you create an audio playlist. Meta information in audio files are not properly sanitized.
- Vulnerability types: XSS
- Tested in version: 4.2
- Fixed in version: 4.2.13
- GIF Walkthrough:
- Steps to recreate: Upload the malicious mp3 file into media. Then create an audio playlist with the malicious file. Insert the audio playlist into a post/page.
- Affected source code:
- (Optional) Vulnerability Name or ID
- Summary:
- Vulnerability types:
- Tested in version:
- Fixed in version:
- GIF Walkthrough:
- Steps to recreate:
- Affected source code:
- (Optional) Vulnerability Name or ID
- Summary:
- Vulnerability types:
- Tested in version:
- Fixed in version:
- GIF Walkthrough:
- Steps to recreate:
- Affected source code:
List any additional assets, such as scripts or files
GIFs created with LiceCap.
Describe any challenges encountered while doing the work
Copyright [yyyy] [name of copyright owner]
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.