{"id":3828,"date":"2014-11-22T05:53:27","date_gmt":"2014-11-21T21:53:27","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3828"},"modified":"2015-09-09T19:36:42","modified_gmt":"2015-09-09T11:36:42","slug":"critical-xss-flaw-affects-wordpress-3-9-2-earlier","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2014\/11\/critical-xss-flaw-affects-wordpress-3-9-2-earlier\/","title":{"rendered":"Critical XSS Flaw Affects WordPress 3.9.2 And Earlier"},"content":{"rendered":"

So it’s been a while since we’ve talked about any flaws in WordPress<\/a> – because usually they are pretty dull and require such an obscure set of circumstances, that they are unlikely to ever occur in the wild.<\/p>\n

The most recent time was this year actually, but was a DoS attack, which is not THAT damaging – XML Quadratic Blowup Attack Blows Up WordPress & Drupal<\/a>.<\/p>\n

\"Critical<\/p>\n

But this, this time it’s different – this one is pretty seriously. Fortunately it’s not a vulnerability in the latest version of WordPress (4.0) but only affects those people still sticking to the latest version on the 3.x branch (3.9.2 or below). <\/p>\n

New security updates released for the WordPress content management system and one of its popular plug-ins fix cross-site scripting (XSS) vulnerabilities that could allow attackers to take control of websites.<\/p>\n

The WordPress development team released Thursday WordPress 4.0.1, 3.9.3, 3.8.5 and 3.7.5 as critical security updates. The 3.9.3, 3.8.5 and 3.7.5 updates address an XSS vulnerability in the comment boxes of WordPress posts and pages. An attacker could exploit this flaw to create comments with malicious JavaScript code embedded in them that would get executed by the browsers of users seeing those comments.<\/p>\n

\u201cIn the most obvious scenario the attacker leaves a comment containing the JavaScript and some links in order to put the comment in the moderation queue,\u201d said Jouko Pynnonen, the security researcher who found the flaw, in an advisory. \u201cWhen a blog administrator goes to the Dashboard\/Comments section to review new comments, the JavaScript gets executed. The script can then perform operations with administrator privileges.\u201d<\/p>\n

Such a rogue operation can be the creation of a second WordPress administrator account with an attacker-specified password. What makes things worse is that the flaw can typically be exploited without authentication, because the action of posting a comment on a WordPress blog does not require an account by default.<\/p><\/blockquote>\n