Hello list!
I want to warn you about multiple vulnerabilities in TinyMCE and flvPlayer
and hundreds of web applications and tens millions of web sites.
These are Full path disclosure, Content Spoofing and Cross-Site Scripting
vulnerabilities in TinyMCE (CS and XSS are in flvPlayer, which is included
with TinyMCE).
-------------------------
Affected products:
-------------------------
Vulnerable are all versions of TinyMCE, which include these files. And
vulnerable (to CS and XSS) are all versions of flvPlayer (flvPlayer v1.0b).
And also all web applications, which are using these versions of TinyMCE and
flvPlayer, and it's hundreds of web applications and tens millions of web
sites in Internet. By information from wordpress.com, at present there are
more then 67 millions of web sites only on WordPress, almost half of them
are hosted at blog-hosting wordpress.com.
Particularly the next web applications are vulnerable:
* WordPress 2.6 - 3.1.1 (which I've checked, and potentially WP 2.5 - 3.2.1)
to FPD. To Content Spoofing are vulnerable versions with file flv_player.swf
(in plugin media in TinyMCE), which is in WP 2.6 - 3.0.1 (which I've
checked, and potentially WP 2.5 - 3.0.5).
* Simple:Press Forum 4.4.5 and previous versions.
* RoundCube 0.6 and previous versions (checked in 0.4-beta and 0.6) to ŃS
and XSS. In last version RoundCube 0.6 uses moxieplayer.swf (instead of
flv_player.swf).
* And many other web applications.
----------
Details:
----------
Full path disclosure (WASC-13):
http://site/path/tinymce/plugins/spellchecker/classes/EnchantSpell.php
http://site/path/tinymce/plugins/spellchecker/classes/GoogleSpell.php
http://site/path/tinymce/plugins/spellchecker/classes/PSpell.php
http://site/path/tinymce/plugins/spellchecker/classes/PSpellShell.php
Content Spoofing (WASC-12):
For WordPress:
http://site/wp-includes/js/tinymce/plugins/media/img/flv_player.swf
For Simple:Press Forum:
http://site/wp-content/plugins/simple-forum/editors/tinymce/plugins/img/media/flv_player.swf
For RoundCube:
http://site/program/js/tiny_mce/plugins/media/img/flv_player.swf
Swf-file of flvPlayer accepts arbitrary addresses in parameter flvToPlay and
startImage, which allows to spoof content of flash - i.e. by setting
addresses of video and/or image files from other site.
http://site/flv_player.swf?flvToPlay=1.flv
http://site/flv_player.swf?autoStart=false&startImage=1.jpg
http://site/flv_player.swf?flvToPlay=1.flv&autoStart=false&startImage=1.jpg
Swf-file of flvPlayer accepts arbitrary addresses in parameter flvToPlay,
which allows to spoof content of flash - i.e. by setting address of playlist
file from other site (parameters thumbnail and url in xml-file accept
arbitrary addresses).
http://site/flv_player.swf?flvToPlay=1.xml
File 1.xml: