22 March 2012

Did you know that tagcloud.swf allows CrossSite Scripting?

I would like to warn you about security vulnerabilities in plugin WP-Cumulus for WordPress. These are Full path disclosure and Cross-Site Scripting vulnerabilities. Which is a web-application vulnerabilities which allow attackers to bypass client-side security mechanisms normally imposed on web content by modern web browsers. By finding ways of injecting malicious scripts into web pages, an attacker can gain elevated access-privileges to sensitive page content, session cookies, and a variety of other information maintained by the browser on behalf of the user.

Full path disclosure:

http://site/wp-content/plugins/wp-cumulus/wp-cumulus.php

XSS:

http://site/wp-content/plugins/wp-cumulus/tagcloud.
swf?mode=tags&tagcloud=%3Ctags%3E%3Ca+href='javascript:
alert(document.cookie)'+style='font-size:
+40pt'%3EClick%20me%3C/a%3E%3C/tags%3E

Code will execute after click. It's strictly social XSS.
There are a lot of vulnerable tagcloud.swf file in Internet (according to Google): 

http://www.google.com.au/search?q=filetype:swf+inurl:tagcloud.swf

So to all flash developers, I recommend you to attend to security of their flash files. And for the owners of sites, with vulnerables flashes like tagcloud.swf, fix them  or turn over to your development team  to fix it. 
 
Kind Regards,
 
Alfredo Cedeno
IT Security Analyst & Advisor
http://ajcborges.blogspot.com