Description
|
|
Two vulnerabilities have been discovered in the uCan Post plugin for WordPress, which can be exploited by malicious users and malicious people to conduct script insertion attacks.
1) Input passed via the "ucan_submission_title" parameter to index.php when creating a post is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed.
2) Input passed via the "ucan_submission_guest_name" parameter to index.php when creating a post is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed.
Successful exploitation of this vulnerability requires that "User Level required to create posts" is set to "Guest" and that the attacker is not logged in.
The vulnerabilities are confirmed in version 1.0.09. Other versions may also be affected.
|