Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

wle parameter allows for possible XSS attack #767

Closed
kinabalu opened this issue Jan 30, 2020 · 3 comments
Closed

wle parameter allows for possible XSS attack #767

kinabalu opened this issue Jan 30, 2020 · 3 comments
Milestone

Comments

@kinabalu
Copy link

Description

As seen in this pull request #766 our team had a InfoSec pen tester successfully inject code into our login page because this parameter is injected without encoding

Reproduction

Given a URL like YOUR_SITE_HERE/wp-login.php?wle=%22%20onEvent%3DX186697040Y2Z%20

it's possible in a situation to inject code into the page in this hidden input type. with the item encoded, we have been able to still login using auth0 and/or the wordpress default login

Environment

Please provide the following:

  • 3.11.2
  • Wordpress 5.3.1
@kinabalu
Copy link
Author

ref #768

@MarcinHoppe
Copy link

@kinabalu thanks for reporting this to us and providing a PR. We have tested the fix, merged the PR, and released version 3.11.3.

Please note that in order to protect our customers that cannot upgrade immediately, we request to not disclose security vulnerabilities in the public issue tracker. Please see this readme section
for reference https://github.com/auth0/wp-auth0/tree/3.11.3#vulnerability-reporting.

We appreciate all vulnerability reports and we strongly suggest to use our responsible disclosure form or to email us directly at [email protected].

@kinabalu
Copy link
Author

kinabalu commented Jan 30, 2020 via email

@joshcanhelp joshcanhelp modified the milestones: 4.0.0, 3.11.3 Feb 7, 2020
@github-actions github-actions bot locked as resolved and limited conversation to collaborators Sep 19, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants