Closed
Bug 751259
Opened 13 years ago
Closed 13 years ago
[XSS] air.mozilla.org - SWFUpload Vulnerable Version
Categories
(Air Mozilla :: Other, defect)
Air Mozilla
Other
Tracking
(Not tracked)
RESOLVED
FIXED
People
(Reporter: kontakt, Assigned: bburton)
References
Details
(Keywords: reporter-external, sec-low, wsec-xss, Whiteboard: [site:air.mozilla.org][reporter-external])
User Agent: Mozilla/5.0 (Windows NT 5.1; rv:10.0) Gecko/20100101 Firefox/10.0
Build ID: 20120129021758
Steps to reproduce:
Hello,
I wanna to report a bug in site air.mozilla.org (Wordpress 3.3.1).
About bug we can read, for example here:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=0
Actual results:
Actual results:
Location of vulnerable:
https://air.mozilla.org/wp-includes/js/swfupload/swfupload.swf
---
Impact Type:Allows unauthorized disclosure of information; Allows unauthorized modification; Allows disruption of service
---
Expected results:
For fix this vulnerability script must be updated for Wordpress 3.3.2
Comment 1•13 years ago
|
||
Your link to nist.gov doesn't work.
Air Mozilla should be upgraded soon though.
This is a working link for nist.gov:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2399
===================
Btw. Does this issue includes the program: http://www.mozilla.org/security/bug-bounty.html ?
Thanks for reply.
Best Regards
This is a working link for nist.gov:
http://web.nvd.nist.gov/view/vuln/detail?vulnId= CVE-2012-2399
Comment 4•13 years ago
|
||
See also http://wordpress.org/news/2012/04/wordpress-3-3-2/
The advisory is missing a lot of detail -- are we vulnerable simply by having it on the site, or must the site be set up to accept uploads? I'm not sure any of our sites or wordpress plugins/themes use the uploader.
Group: core-security → websites-security
Comment 6•13 years ago
|
||
Lacking a PoC we don't know if we're actually vulnerable or not on this one.
Status: UNCONFIRMED → NEW
Ever confirmed: true
Comment 11•13 years ago
|
||
When we upgrade WP (bug 747454) it should fix all sites. The dupe bugs explicitly mention
blog.mozilla.org
hacks.mozilla.org
mpl.mozilla.org
quality.mozilla.org
and I'm sure there are others.
Comment 12•13 years ago
|
||
What is the timeline on that update? I can't see bug 747454.
| Assignee | ||
Comment 13•13 years ago
|
||
This has been resolved with https://bugzilla.mozilla.org/show_bug.cgi?id=753169
Assignee: nobody → bburton
Status: NEW → RESOLVED
Closed: 13 years ago
Resolution: --- → FIXED
| Reporter | ||
Comment 14•13 years ago
|
||
Hey,
Does this issue includes the program: http://www.mozilla.org/security/bug-bounty.html ?
Thanks for reply.
Best Regards
Comment 15•13 years ago
|
||
How is this fixed when the file https://air.mozilla.org/wp-includes/js/swfupload/swfupload.swf is still accessible?
| Reporter | ||
Comment 16•13 years ago
|
||
Hello Al,
Wordpress has been updated, so bug has been fixed.
Best Regards,
Thanks for reply
| Reporter | ||
Comment 17•13 years ago
|
||
BTW. This bug is fixed too:
http://packetstormsecurity.org/files/112481/wordpress322-xss.txt
?
| Reporter | ||
Comment 18•13 years ago
|
||
BTW. This is the PoC:
/wp-includes/js/swfupload/swfupload.swf?movieName="]);}catch(e){}if(!self.a)self.a=!alert(1);//
but now is fixed.
Summary: air.mozilla.org - SWFUpload Vulnerable Version → [XSS] air.mozilla.org - SWFUpload Vulnerable Version
| Reporter | ||
Comment 19•13 years ago
|
||
Does this issue includes the program: http://www.mozilla.org/security/bug-bounty.html ?
Comment 20•12 years ago
|
||
Adding keywords to bugs for metrics, no action required. Sorry about bugmail spam.
Keywords: wsec-xss
Updated•9 years ago
|
Group: websites-security, mozilla-employee-confidential
Updated•1 year ago
|
Keywords: reporter-external
You need to log in
before you can comment on or make changes to this bug.
Description
•