Summary
This host is installed with Wordpress DZS Video Gallery Plugin and is prone to cross site scripting vulnerability.
Impact
Successful exploitation will allow attacker to execute arbitrary HTML and script code in a user's browser session in the context of an affected site
Impact Level: Application
Solution
No Solution or patch is available as of 17th February, 2014. Information regarding this issue will be updated once the solution details are available.
For updates refer to http://digitalzoomstudio.net
Insight
Input passed via the 'source' parameter to /dzs-videogallery/ajax.php script is not properly sanitized before being returned to the user.
Affected
WordPress DZS-VideoGallery Plugin
Detection
Send a crafted data via HTTP GET request and check whether it is able to read cookie or not.
References
Severity
Classification
-
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Apache ActiveMQ 'admin/queueBrowse' Cross Site Scripting Vulnerability
- 2532|Gigs Directory Traversal And SQL Injection Multiple Vulnerabilities
- /doc directory browsable ?
- Apache Tomcat source.jsp malformed request information disclosure
- AeroMail Cross Site Request Forgery, HTML Injection and Cross Site Scripting Vulnerabilities