Million WordPress user vulnerable to DOM-based XSS
Any WordPress Plugin or theme
that leverages the genericons package is vulnerable to a DOM-based Cross-Site
Scripting (XSS) vulnerability due to an insecure file included with genericons.
JetPack and TwentyFifteen Vulnerable to DOM-based XSS.
DOM XSS
DOM Based XSS simply means a
Cross-site scripting vulnerability that appears in the DOM (Document Object
Model) instead of part of the HTML. DOM XSS is a type of cross site scripting
attack which relies on inappropriate handling, in the HTML page, of the data
from its associated DOM. Among the objects in the DOM, there are several which
the attacker can manipulate in order to generate the XSS condition, and the
most popular, from this perspective, are the document.url, document.location
and document.referrer objects.
Any plugin that makes use of this
package is potentially vulnerable if it includes the example.html file that
comes with the package.
Fortunately, the fix for this one
is pretty straight forward. Remove the unnecessary genericons/example.html file
or make sure you have a WAF or IDS that is blocking access to it.
No comments:
Post a Comment