Nytro Posted November 21, 2011 Report Posted November 21, 2011 New XSS vulnerability in WP-Cumulus for WordPress and multiple web applications and mFrom: "MustLive" <mustlive () websecurity com ua>Date: Sun, 20 Nov 2011 23:40:48 +0200Hello list!I want to warn you about new Cross-Site Scripting vulnerability inWP-Cumulus for WordPress and multiple web applications and millions websites.Earlier I wrote about XSS vulnerability in WP-Cumulus, which I've disclosedin 2009 (Security Advisory: Vulnerabilities in WP-Cumulus for WordPress - security vulnerabilities database), and many other plugins(and widgets and themes) for different engines, which are using tagcloud.swfmade by author of WP-Cumulus. About millions of flash files tagcloud.swfwhich are vulnerable to XSS attacks I mentioned in my article XSSvulnerabilities in 34 millions flash files([WEB SECURITY] XSS vulnerabilities in 34 millions flash files).-------------------------Affected products:-------------------------Vulnerable are all versions of WP-Cumulus. At that Roy Tanck's patch(version of flash-file for WP-Cumulus 1.23) will work for this vulnerabilitytoo, so in fixed versions of flash-file the XSS will not work, only HTMLInjection.Also must be vulnerable Joomulus for Joomla, JVClouds3D for Joomla,Blogumus, 3D Cloud for Joomla, Tagcloud for DLE, t3m_cumulus_tagcloud forTYPO3, Cumulus for BlogEngine.NET, tagcloud for Kasseler CMS, 3D user cloudfor Joomla, Flash Tag Cloud for Blogsa and other ASP.NET engines, b-cumulus,Cumulus for Drupal, sfWpCumulusPlugin for symfony, Flash Tag Cloud For MT 4,MT-Cumulus for Movable Type, Tumulus for Typepad, WP-Cumulus forRapidWeaver, HB-Cumulus for Habari, Cumulus for DasBlog, EZcumulus and eZFlash Tag Cloud for eZ Publish, Simple Tags for Expression Engine (version1.6.3 and new versions, where support of this swf-file was added), Freetagfor Serendipity (of this flash-file was added in version 2.103), Tag cloudfor Social Web CMS, Animated tag cloud for PHP-Fusion, 3D Advanced TagsClouds for Magento, Cumulus for Sweetcron and other web applications withthis flash-file.And also themes for engines, particularly for Drupal(http://websecurity.com.ua/5407/), which are using this flash-file (I'vewrote earlier about five vulnerable themes for Drupal). As I mentionedbellow, vulnerable are only web applications with new versions of thisflash-file (and a lot of web applications and sites are using exactly newversions of it). But when web developers or admins of sites, which are usingold versions of swf-file (unaffected) will decided to update it (just "toupdate" or to fix first XSS vulnerability, which can be done by updating tofixed version from Roy Tanck), then they will become vulnerable to thishole.----------Details:----------If previous vulnerability in tagcloud.swf concerned parameter mode, then newvulnerability concerns parameter xmlpath.XSS (WASC-08):http://site/tagcloud.swf?xmlpath=xss.xmlhttp://site/tagcloud.swf?xmlpath=http://site/xss.xmlFile xss.xml:<tags><a href="javascript:alert(document.cookie)" style="font-size:+40pt">Clickme</a><a href="http://websecurity.com.ua"; style="font-size:+40pt">Click me</a></tags>Code will execute after click. It's strictly social XSS(Strictly social XSS - Websecurity -). Also it's possible to conduct (like inWP-Cumulus) HTML Injection attack.The attack will work only in new versions of flash-file, where support ofparameter xmlpath was added. In old versions (not affected) in context menuis mentioned "WP-Cumulus by Roy Tanck", and in new versions (affected)mentioned "WP-Cumulus by Roy Tanck and Luke Morton". The attack will workonly when xml-file is placed at the same site (the path can be relative orabsolute). Extension of the file can be arbitrary.------------Timeline:------------2011.11.09 - found vulnerability.2011.11.17 - disclosed at my site.2011.11.19 - informed developer of WP-Cumulus. All developers of forks ofWP-Cumulus and developers of web applications, which are using thisflash-file, can read about this issue at my site and in security mailinglists. In any case, the correct fix for first XSS hole (in links handlingalgorithm) also fixes the second XSS hole, so after I've informed allabove-mentioned developers during 2009-2011, if they fixed first hole, thenthey fixed the second one.I mentioned about this vulnerability at my site:http://websecurity.com.ua/5505/Best wishes & regards,MustLiveAdministrator of Websecurity web siteWebsecurity -Sursa: Full Disclosure: New XSS vulnerability in WP-Cumulus for WordPress and multiple web applications and millions web sites Quote