Headquarters
Rua Marechal Hermes 678 CJ 32
CEP 80530-230, Curitiba, PR
T (41) 3095.5736 | (41) 3095.3986
http://www.conviso.com.br
Conviso IT Security
Contents
Introduction ..............................................................................................................................2
Introduction
This advisory has been discovered as part of a general investigation into the security of software used
in the IT environments of our customers. For more information about our company and services
provided, please check our website at www.conviso.com.br.
The vulnerability described in this security advisory was discovered by Wagner Elias on July 24th 2010
during a penetration test project.
Security Advisory
1. Issue Description
Created and distributed by Delicious Days (http://www.deliciousdays.com/), cforms is a rich form
plugin for WordPress, offering deployment of multiple Ajax driven contact forms throughout user’s blog
or even on the same page. An issue on version 11.5 allows the exploit of a Cross Site Scripting (XSS)
vulnerability and the consequent capability of client-side attacks for data leaking and malware
propagation.
2. Affected Components
File lib_ajax.php on version 11.5.
3. Details
The file lib_ajax.php on version 11.5 creates a data array with all values inserted on the form’s fields on
a POST requisition. As there is no data validation of the rs and rsargs parameters, it is possible to
inject malformed data by Javascript.
Request:
http://www.siteexample.com/wp-content/plugins/cforms/lib_ajax.php
rs=<script>alert(1)</script>&rst=&rsrnd=1287506634854&rsargs[]=1$#
$<script>alert(1)</script>$#$welias@conviso.com.br$#$http://
www.conviso.com.br$#$<script>alert(1)</script>
4. Issue Mitigation
Update to version 11.6.1.
5. Additional Information
The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2010-3977 to
this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org), which standardizes
names for security problems.
Conviso IT Security calculated the scores of this vulnerability using the online CVSS calculator found at
http://www.patchadvisor.com/PatchAdvisor/CVSSCalculator.aspx and described at http://
www.first.org/cvss/cvss-guide.pdf.
Issue History
Date Comments