Aerosol Posted December 1, 2014 Report Posted December 1, 2014 <http://tetraph.com/security/open-redirect/cve-2014-8754-wordpress-ad-manager-plugin-dest-redirect-privilege-escalation/#respond>*CVE-2014-8754 WordPress “Ad-Manager Plugin” Dest Redirect PrivilegeEscalation*Exploit Title: WordPress Ad-Manager Plugin Dest Redirect PrivilegeEscalation VulnerabilityProduct: WordPress Ad-Manager PluginVendor: CodeCanyonVulnerable Versions: 1.1.2Tested Version: 1.1.2Advisory Publication: Nov 25, 2014Latest Update: Nov 25, 2014Vulnerability Type: URL Redirection to Untrusted Site [CWE-601]CVE Reference: CVE-2014-8754CVSS v2 Base Score: 5.8 (MEDIUM) (AV:N/AC:M/Au:N/C:P/I:P/A:N) (legend)Impact Subscore: 4.9Exploitability Subscore: 8.6Credit: Wang Jing [SPMS, Nanyang Technological University, Singapore]*Advisory Details**(1) Product:*“WordPress Ad-Manager offers users a simple solution to implementadvertising into their posts, their blog or any other WordPress page. Userscan use pictures and images or HTML snippets like Google AdSense toincorporate advertising in an easy way.”*(2) Vulnerability Details:*The Dest Redirect Privilege Escalation vulnerability occurs at“track-click.php” page with “&out” parameter.*References:*http://tetraph.com/security/cves/cve-2014-8754-wordpress-ad-manager-plugin-dest-redirect-privilege-escalation/http://codecanyon.net/item/wordpress-admanager/544421https://wordpress.org/plugins/ad-manager-for-wp/http://cwe.mitre.orghttp://cve.mitre.org/Source Quote