Hi Aaron,
You’re right! We’ll update the plugin by the end of the day in order to take care of this type of exploit.
Thread Starter
Aaron
(@akeith2002)
Really appreciate the quickness of your response!!!
There are actually 2 more smaller items they mentioned:
Finding: Cross-site Request Forgery Vulnerabilities found in Client Community Site
Description:
Cross-site Request Forgery Vulnerabilities exist on the Client Community Site.
The affected pages are:
/members-login/
/members-login/password-recovery/
/members-login/register/
Although the vulnerabilities do not pose a significant security risk they should be mitigated in production.
Sample Request/Response with vulnerability
Recommendations:
For some understanding on how to mitigate these vulnerabilities:
https://www.owasp.org/index.php/Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF)
Finding: Remember me checked by default on Client Community Test Page
Description:
When you navigate to /members-login/ the remember me button is already checked.
This poses a security risk to access control for users who log in on shared computers and public machines.
Although the vulnerabilities do not pose a significant security risk they should be mitigated in production.
Thread Starter
Aaron
(@akeith2002)
Not sure if the first one makes sense to you… the link they sent doesn’t work. I think they probably meant this link: https://en.wikipedia.org/wiki/Cross-site_request_forgery
Hi Aaron,
Thank you for sending these our way.
The XSS exploits are already fixed in the latest verion: http://wordpress.org/plugins/profile-builder/changelog/
I’m going to document my self regarding the second ones and see how we can fix them.
Thread Starter
Aaron
(@akeith2002)
Again, I cannot thank you enough!!! A+