WordPress Wordfence 5.2.3 Cross Site Scripting / Bypass

2014.09.16
Credit: Voxel
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

Wordfence v5.2.3 suffers from multiple vulnerabilities. Stored XSS in IPTraf.php resulting from failing to sanitize $_SERVER['REQUEST_URI'] Stored XSS in cached pages resulting from failing to sanitize $_SERVER['HTTP_HOST'] <-- Yep, you can put javascript in the host header Insufficient Logging - One can trivially avoid having your requests logged because of some crappy code designed to filter out some types of requests Throttle bypass - Unlogged requests won't trigger automatic throttling and banning Revolution Slider exploit protection bypass - people seriously need to learn how $_REQUEST works. Also, if you have a few bucks to buy a domain name, you can make the plugin tell the admin that your IP belongs to google when they try to ban you. Details can be found here: https://vexatioustendencies.com/wordfence-v5-2-3-2-stored-xss-insufficient-logging-throttle-bypass-exploit-detection-bypass/ -Voxel@Night

References:

https://vexatioustendencies.com/wordfence-v5-2-3-2-stored-xss-insufficient-logging-throttle-bypass-exploit-detection-bypass/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top