Vigil@nce - WordPress File Monitor: Cross Site Scripting via alertDesc
August 2016 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can trigger a Cross Site Scripting via the request
parameter alertDesc of WordPress File Monitor, in order to run
JavaScript code in the context of the web site.
Impacted products: WordPress Plugins not comprehensive.
Severity: 2/4.
Creation date: 23/06/2016.
DESCRIPTION OF THE VULNERABILITY
The File Monitor plugin can be installed on WordPress.
However, it does not filter received data before inserting them in
generated HTML documents.
An attacker can therefore trigger a Cross Site Scripting via the
request parameter alertDesc of WordPress File Monitor, in order to
run JavaScript code in the context of the web site.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
https://vigilance.fr/vulnerability/WordPress-File-Monitor-Cross-Site-Scripting-via-alertDesc-19961