security advisory: cform wordpress plugin v 11

7
Security Advisory | CVE-2010-3977 cform Wordpress Plugin V 11.5 Curitiba | Brasilia | São Paulo Headquarters Rua Marechal Hermes 678 CJ 32 CEP 80530-230, Curitiba, PR T (41) 3095.5736 | (41) 3095.3986 http://www.conviso.com.br

Upload: conviso-application-security

Post on 08-Apr-2015

266 views

Category:

Documents


2 download

DESCRIPTION

According to Delicious Days, "cforms is a powerful and feature rich form plugin for WordPress, offering convenient deployment of multiple Ajax driven contact forms throughout your blog or even on the same page."This problem was confirmed in the following versions of the cforms WordPress Plugin, other versions maybe also affected.

TRANSCRIPT

Page 1: Security Advisory: Cform Wordpress Plugin v 11

Security Advisory | CVE-2010-3977

cform Wordpress Plugin V 11.5

Curitiba | Brasilia | São Paulo

HeadquartersRua Marechal Hermes 678 CJ 32CEP 80530-230, Curitiba, PRT (41) 3095.5736 | (41) 3095.3986

http://www.conviso.com.br

Page 2: Security Advisory: Cform Wordpress Plugin v 11

Contents

..............................................................................................................................Introduction 2

.....................................................................................................................Security Advisory 3

...................................................................................................CVSS Issue Severity Scores 5

.............................................................................................................................Issue History 6

Conviso IT Security

Security Advisory | CVE-2010-3977 | cform Wordpress Plugin V 11.5! 1

Page 3: Security Advisory: Cform Wordpress Plugin v 11

Introduction

1. Copyright and DisclaimerThe information in this advisory is Copyright 2010 Conviso IT Security and provided so that the society

can understand the risk they may be facing by running affected software, hardware or other

components used on their systems. In case you wish to copy information from this advisory, you must

either copy all of it or refer to this document (including our URL). No guarantee is provided for the

accuracy of this information, or damage you may cause your systems in testing.

2. About Conviso IT Security

Founded on 2008 by a team of professionals working the IT Security market since 1997, Conviso IT

Security is a consulting company specialized on network and application security services. Our values

are based on the allocation of the adequate competencies on the field, a clear and direct speech with

the market, collaboration and partnership with our customers and business partners and constant

investments on methodology and research improvement.

This advisory has been discovered as part of a general investigation into the security of software used

in the IT environments of our customers. For more information about our company and services

provided, please check our website at www.conviso.com.br.

3. The Security ResearchConviso IT Security maintains a virtual team dedicated to explore our customer’s environments in order

to identify technical vulnerabilities in software and hardware, developing real-world mitigation solutions

and processes to maintain more secure environments. Leaded by Wagner Elias, our R&D Manager,

this team is named Conviso Security Labs and also contribute to important world-class organizations

projects and organizations.

The vulnerability described in this security advisory was discovered by Wagner Elias on July 24th 2010

during a penetration test project.

Conviso IT Security

Security Advisory | CVE-2010-3977 | cform Wordpress Plugin V 11.5! 2

Page 4: Security Advisory: Cform Wordpress Plugin v 11

Security Advisory

1. Issue DescriptionCreated and distributed by Delicious Days (http://www.deliciousdays.com/), cforms is a rich form

plugin for WordPress, offering deployment of multiple Ajax driven contact forms throughout user’s blog

or even on the same page. An issue on version 11.5 allows the exploit of a Cross Site Scripting (XSS)

vulnerability and the consequent capability of client-side attacks for data leaking and malware

propagation.

2. Affected Components

File lib_ajax.php on version 11.5.

3. DetailsThe file lib_ajax.php on version 11.5 creates a data array with all values inserted on the form’s fields on

a POST requisition. As there is no data validation of the rs and rsargs parameters, it is possible to

inject malformed data by Javascript.

Request:http://www.siteexample.com/wp-content/plugins/cforms/lib_ajax.php

POST /wp-content/plugins/cforms/lib_ajax.php HTTP/1.1Host: www.siteexample.comUser-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.10) Gecko/20100914 Firefox/3.6.10Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-us,en;q=0.5Accept-Encoding: gzip,deflateAccept-Charset: ISO-8859-1,utf-8;q=0.7,*;q=0.7Keep-Alive: 115Connection: keep-aliveContent-Type: application/x-www-form-urlencoded; charset=UTF-8Content-Length: 219Cookie: wp-settings-1=m0%3Do%26m1%3Do%26m2%3Do%26m3%3Do%26m4%3Do%26m5%3Do%26m6%3Do%26m7%3Do%26m8%3Do%26urlbutton%3Dnone%26editor%3Dtinymce%26imgsize%3Dfull%26align%3Dcenter%26hidetb%3D1%26m9%3Dc%26m10%3Do%26uploader%3D1%26m11%3Do; wp-settings-time-1=1285758765; c o m m e n t _ a u t h o r _ 9 3 f 4 1 b a 0 b 1 6 f 3 4 6 7 6 f 8 0 2 0 5 8 e 8 2 3 8 8 f 6 = t e s t e ; comment_author_email_93f41ba0b16f34676f802058e82388f6=welias%40conviso.com.brPragma: no-cacheCache-Control: no-cache

rs=<script>alert(1)</script>&rst=&rsrnd=1287506634854&rsargs[]=1$#$<script>alert(1)</script>$#[email protected]$#$http://www.conviso.com.br$#$<script>alert(1)</script>

4. Issue MitigationUpdate to version 11.6.1.

Conviso IT Security

Security Advisory | CVE-2010-3977 | cform Wordpress Plugin V 11.5! 3

Page 5: Security Advisory: Cform Wordpress Plugin v 11

5. Additional InformationThe Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2010-3977 to

this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org), which standardizes

names for security problems.

Conviso IT Security

Security Advisory | CVE-2010-3977 | cform Wordpress Plugin V 11.5! 4

Page 6: Security Advisory: Cform Wordpress Plugin v 11

CVSS Issue Severity Scores

Conviso IT Security calculated the scores of this vulnerability using the online CVSS calculator found at

http://www.patchadvisor.com/PatchAdvisor/CVSSCalculator.aspx and described at http://

www.first.org/cvss/cvss-guide.pdf.

Criteria Description Value

Base Metrics

Value: 5.7

Base Metrics

Value: 5.7

Base Metrics

Value: 5.7

Base Metrics

Value: 5.7

Base Metrics

Value: 5.7

Base Metrics

Value: 5.7

Base Metrics

Value: 5.7

Temporal Metrics

Value: 4.5

Temporal Metrics

Value: 4.5

Temporal Metrics

Value: 4.5

Environmental Metrics

Value: 0

Environmental Metrics

Value: 0

Access Vector Remote

Access Complexity Low

Authentication Not Required

Confidentiality Impact Partial

Integrity Impact Complete

Availability Impact None

Impact BIAS Normal

Exploitability Functional

Remediation Level Official Fix

Report Confidence Uncorroborated

Collateral Damage Potential None

Target Distribution None

Conviso IT Security

Security Advisory | CVE-2010-3977 | cform Wordpress Plugin V 11.5! 5

Page 7: Security Advisory: Cform Wordpress Plugin v 11

Issue History

Date Comments

07/24/10 Issue reported to Delicious Day

07/24/10 Issue accepted by Delicious Day

09/22/10 Version 11.6.1 available with the correspondent fix

10/19/10 Issue published

Conviso IT Security

Security Advisory | CVE-2010-3977 | cform Wordpress Plugin V 11.5! 6