============================== Vulnerability ID: HTB22937 Reference: http://www.htbridge.ch/advisory/path_disclosure_in_universal_post_manager_wordpress_plugin.html Product: Universal Post Manager wordpress plugin Vendor: ProfProjects ( Artyom Chakhoyan ) ( http://www.profprojects.com/ ) Vulnerable Version: 1.0.9 Vendor Notification: 05 April 2011 Vulnerability Type: Path disclosure Risk level: Low Credit: High-Tech Bridge SA Security Research Lab ( http://www.htbridge.ch/advisory/ ) Vulnerability Details: The vulnerability exists due to failure in "/wp-content/plugins/universal-post-manager/bycat.php" script, it's possible to generate an error that will reveal the full path of the script. A remote user can determine the full path to the web root directory and other potentially sensitive information. The following PoC is available: [code] http://[host]/wp-content/plugins/universal-post-manager/bycat.php [/code] ============================== Vulnerability ID: HTB22938 Reference: http://www.htbridge.ch/advisory/multiple_xss_in_universal_post_manager_wordpress_plugin.html Product: Universal Post Manager wordpress plugin Vendor: ProfProjects ( Artyom Chakhoyan ) ( http://www.profprojects.com/ ) Vulnerable Version: 1.0.9 Vendor Notification: 05 April 2011 Vulnerability Type: XSS (Cross Site Scripting) Risk level: Medium Credit: High-Tech Bridge SA Security Research Lab ( http://www.htbridge.ch/advisory/ ) Vulnerability Details: The vulnerability exists due to failure in the "/wp-content/plugins/universal-post-manager/template/email_screen_1.php" script to properly sanitize user-supplied input in "num" variable then register_qlobals is on. User can execute arbitrary JavaScript code within the vulnerable application. Successful exploitation of this vulnerability could result in a compromise of the application, theft of cookie-based authentication credentials, disclosure or modification of sensitive data. The following PoC is available: [code] http://[host]/wp-content/plugins/universal-post-manager/template/email_screen_1.php?unit=1&num=%27%29%3E%3Cscript%3Ealert%28%22XSS%22%29;%3C/script%3E [/code] The vulnerability exists due to failure in the "/wp-content/plugins/universal-post-manager/template/bookmarks_slider_h.php" script to properly sanitize user-supplied input in "number" variable then register_qlobals is on. The following PoC is available: [code] http://[host]/wp-content/plugins/universal-post-manager/template/bookmarks_slider_h.php?number=%3Cscript%3Ealert%28%22XSS%22%29;%3C/script%3E [/code] The vulnerability exists due to failure in the "/wp-content/plugins/universal-post-manager/template/email_screen_2.php" script to properly sanitize user-supplied input in "num" variable then register_qlobals is on. The following PoC is available: [code] http://wordpress/wp-content/plugins/universal-post-manager/template/email_screen_2.php?unit=1&num=%22%3E%3Cscript%3Ealert%28%22XSS%22%29;%3C/script%3E [/code]