what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

wppass-redirect.txt

wppass-redirect.txt
Posted Jul 7, 2007
Authored by Nick Coblentz | Site securityps.com

The wp-pass.php script in WordPress version 2.2.1 suffers from a redirection vulnerability.

tags | exploit, php
SHA-256 | 34164951dd23e1069f68094fadeec29d745e2538bc48b15d93bb496e84a202d3

wppass-redirect.txt

Change Mirror Download
The vulnerability found could allow an attacker to redirect victims to
an arbitrary 3rd party site. This site could be a phishing site or
contain malware allowing the attacker to steal account credentials or
compromise hosts. This vulnerability can be found in Wordpress 2.2,
however it is likely that it exists in previous versions as well.

Additional vulnerabilities may exist in the following areas due to the
use of the problematic code:

wp-includes/pluggable.php (lines 282 to 292)
wp-includes/functions.php, wp_nonce_ays function (lines 1287 to 1313)


Description:

The wp-pass.php page can be used to redirect users to arbitrary third
party sites. An attacker may use this vulnerability to redirect users to
a phishing or malware site.


Relevant Code:

wp-pass.php (line 10)

wp_redirect(wp_get_referer());


wp-includes/functions.php (line 1040 to 1045)

function wp_get_referer() {
foreach ( array($_REQUEST['_wp_http_referer'],
$_SERVER['HTTP_REFERER']) as $ref )
if ( !empty($ref) )
return $ref;
return false;
}


Exploit:

http://<WordpressSiteAddressHere>/wp-pass.php?_wp_http_referer=http://ww
w.EvilPhishingOrMalwareSite.com

Since the function uses the $_REQUEST variable, this attack could also
be executed using a cookie or post parameter named "_wp_http_referer"

If this were a real attack, A link would be sent to users in an E-mail,
IM, or other delivery message to trick users into visiting the link.


Versions Affected:

This vulnerability is likely present in several previous versions of
Wordpress, however it was tested and verified in version 2.2.1


Vendor Response:

The Wordpress team is currently working on addressing this issue and
others in the 2.2.2 release of its blogging software.


Disclosure Timeline:

2007-06-21 Discovery by Nick Coblentz of Security PS
(http://www.securityps.com)
2007-06-22 Vendor notification
2007-07-02 2nd Vendor notification
2007-07-05 Vendor response


Remediation:

Wordpress 2.2.2 will address this issue as well as others.


Credit:

This vulnerability was discovered by Nicholas Coblentz, a security
consultant a Security PS (http://www.securityps.com).The vulnerability
found could allow an attacker to redirect victims to an arbitrary 3rd
party site. This site could be a phishing site or contain malware
allowing the attacker to steal account credentials or compromise hosts.
This vulnerability can be found in Wordpress 2.2, however it is likely
that it exists in previous versions as well.

Additional vulnerabilities may exist in the following areas due to the
use of the problematic code:

wp-includes/pluggable.php (lines 282 to 292)
wp-includes/functions.php, wp_nonce_ays function (lines 1287 to 1313)


Description:

The wp-pass.php page can be used to redirect users to arbitrary third
party sites. An attacker may use this vulnerability to redirect users to
a phishing or malware site.


Relevant Code:

wp-pass.php (line 10)

wp_redirect(wp_get_referer());


wp-includes/functions.php (line 1040 to 1045)

function wp_get_referer() {
foreach ( array($_REQUEST['_wp_http_referer'],
$_SERVER['HTTP_REFERER']) as $ref )
if ( !empty($ref) )
return $ref;
return false;
}


Exploit:

http://<WordpressSiteAddressHere>/wp-pass.php?_wp_http_referer=http://ww
w.EvilPhishingOrMalwareSite.com

Since the function uses the $_REQUEST variable, this attack could also
be executed using a cookie or post parameter named "_wp_http_referer"

If this were a real attack, A link would be sent to users in an E-mail,
IM, or other delivery message to trick users into visiting the link.


Versions Affected:

This vulnerability is likely present in several previous versions of
Wordpress, however it was tested and verified in version 2.2.1


Vendor Response:

The Wordpress team is currently working on addressing this issue and
others in the 2.2.2 release of its blogging software.


Disclosure Timeline:

2007-06-21 Discovery by Nick Coblentz of Security PS
(http://www.securityps.com)
2007-06-22 Vendor notification
2007-07-02 2nd Vendor notification
2007-07-05 Vendor response


Remediation:

Wordpress 2.2.2 will address this issue as well as others.


Credit:

This vulnerability was discovered by Nicholas Coblentz, a security
consultant a Security PS (http://www.securityps.com).
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    28 Files
  • 7
    May 7th
    3 Files
  • 8
    May 8th
    4 Files
  • 9
    May 9th
    54 Files
  • 10
    May 10th
    12 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    17 Files
  • 14
    May 14th
    11 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close