Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: John Smith (zamolx3gmail.com)
Date: Fri Jun 08 2007 - 08:15:38 CDT
There is an XSS in the Wordpress default theme. Tested on WordPress version 2.2
Filename functions.php, line 387.
<form style="display: inline" method="post" name="hicolor"
id="hicolor" action="<?php echo $_SERVER['REQUEST_URI']; ?>">
$_SERVER['REQUEST_URI'] is directly echoed to the user.
This problem can be exploited if the adminstrator is logged in.
Sample exploit URL.
There are other XSS vulnerabilities in popular Wordpress themes.
More details on http://www.xssnews.com/
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/