TALE OF FORGOTTEN
DISCLOSURE
BY
ANANT SHRIVASTAVA
ANANT SHRIVASTAVA
Information Security Consultant
Admin - Dev - Security
null + OWASP + G4H
and @anantshri
Co-Author OWASP Testing Guide 4.0
Projects
http://anantshri.info
     
SCENARIO
1. A vulnerability present in code (last updated March 2013)
2. Public disclosure in aug 2014.
3. Interestingly someone posted a pull request in Jan 2013
4. Till may 2015 it was not patched even though there was a new release after the
pull request was in place.
INFORMATION RECIEVED
INVESTIGATION RESULT
1. Javascript Based DOM-XSS
2. Culprit identified as facebook-page-photo-gallery wordpress plugin.
3. Remove the plugin
4. XSS Fixed; Issue closed
5. End of Story
EMAIL TO PLUGINS TEAM
RESPONSE FROM PLUGIN TEAM
MEANWHILE
DISCOVERY REQUIRES EXPERIMENTATION
REPOSITORY
CRUX OF THE ISSUE
function getHashtag(){
var url = location.href;
hashtag = (url.indexOf('#prettyPhoto') !== -1) ? decodeURI(url.substring(url.indexOf('#pretty
Photo')+1,url.length)) : false;
return hashtag;
};
GOOGLE AHOY
INTERESTING FACT
CONTACTING AUTHOR
SPREAD THE WORD
SPREAD THE WORD
SPREAD THE WORD
FINALLY SOME ACTION
SOME ACTION
RELIEVED
LET THE WORLD BE IN PEACE
AND
LETS GET BACK TO WORK
AFTER 7 DAYS
WHY YOU NO FIX
WORDPRESS PLUGIN INFO
1. Total 35 Plugins Found
Total Plugin Downloads Active Install
2882520 3,37,780
NERDY DATA
WHAT IS VULNERABLE
1. Any application / website which has jquery.prettyphoto.js
2. Version 3.1.4 and 3.1.5 are confirmed vulnerable older versions not checked.
WHAT IS A FIX
1. Upgrade to 3.1.6
ENOUGH OF THE PAST
WHAT'S IN IT FOR ME.
LESSONS TO BE LEARNED
FOR DEVELOPER
1. Never ignore pull requests and security issue bug report.
2. Proactively test software and at-least if a fix is released publicly accept security
issue.
FOR DEVELOPERS / SYSADMIN /
DEVOPS
1. never ignore update from shared library
2. Keep an eye on how shared resources are holding up.
3. Monitor your Dependencies
HOW
HOW
HOW
IS THIS ENOUGH
1. Not yet
2. We still lack method to track it for every third party library.
3. Manual tracking is still required.
REFERENCES
1. A9 - Using Components with Known Vulnerabilities
2. https://www.owasp.org/index.php/Top_10_2013-A9-
Using_Components_with_Known_Vulnerabilities
THANKS

More Related Content

PDF
My tryst with sourcecode review
PDF
When the internet bleeded : RootConf 2014
PDF
Security Issues in Android Custom ROM
PDF
Null bhopal Sep 2016: What it Takes to Secure a Web Application
PDF
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
PDF
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
PDF
SSL Pinning and Bypasses: Android and iOS
PDF
Hijacking Softwares for fun and profit
My tryst with sourcecode review
When the internet bleeded : RootConf 2014
Security Issues in Android Custom ROM
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
SSL Pinning and Bypasses: Android and iOS
Hijacking Softwares for fun and profit

What's hot (20)

PPTX
[Wroclaw #5] OWASP Projects: beyond Top 10
PPTX
[Wroclaw #2] Web Application Security Headers
PDF
REST API Pentester's perspective
PDF
Ground Zero Training- Metasploit For Web
PDF
Make CSRF Again
PPT
Web2.0 : an introduction
PDF
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
PDF
[Wroclaw #7] Why So Serial?
PPT
[Php Camp]Owasp Php Top5+Csrf
PDF
Web Security... Level Up
PDF
Nessus and Reporting Karma
PDF
HackFest 2015 - Rasp vs waf
PDF
20+ Ways to Bypass Your macOS Privacy Mechanisms
PPTX
Cyber ppt
PPTX
OSX/Pirrit: The blue balls of OS X adware
PDF
Building & Hacking Modern iOS Apps
PPTX
Bug Bounty #Defconlucknow2016
PDF
Hacking Vulnerable Websites to Bypass Firewalls
PDF
Testing iOS apps without jailbreak in 2018
[Wroclaw #5] OWASP Projects: beyond Top 10
[Wroclaw #2] Web Application Security Headers
REST API Pentester's perspective
Ground Zero Training- Metasploit For Web
Make CSRF Again
Web2.0 : an introduction
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
[Wroclaw #7] Why So Serial?
[Php Camp]Owasp Php Top5+Csrf
Web Security... Level Up
Nessus and Reporting Karma
HackFest 2015 - Rasp vs waf
20+ Ways to Bypass Your macOS Privacy Mechanisms
Cyber ppt
OSX/Pirrit: The blue balls of OS X adware
Building & Hacking Modern iOS Apps
Bug Bounty #Defconlucknow2016
Hacking Vulnerable Websites to Bypass Firewalls
Testing iOS apps without jailbreak in 2018
Ad

Viewers also liked (20)

PDF
OWASP Bangalore : OWTF demo : 13 Dec 2014
PPTX
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
PDF
Android Tamer BH USA 2016 : Arsenal Presentation
PDF
Snake bites : Python for Pentesters
PDF
Android Tamer: Virtual Machine for Android (Security) Professionals
PDF
Exploiting publically exposed Version Control System
PDF
Slides null puliya linux basics
PDF
Raspberry pi Beginners Session
PPTX
Career In Information security
PPT
Avr introduction
PDF
Can Security Vulnerability Disclosure Processes Be Responsible, Rational and ...
PDF
Demystifying captcha Bangalore Meet April 18
PDF
Browser Exploit Framework
PPTX
The Shellshocker
PDF
Secuirty News Bytes-Bangalore may 2014
PPTX
IE Memory Protector
PDF
Owasp Mobile Top 10 – 2014
OWASP Bangalore : OWTF demo : 13 Dec 2014
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Android Tamer BH USA 2016 : Arsenal Presentation
Snake bites : Python for Pentesters
Android Tamer: Virtual Machine for Android (Security) Professionals
Exploiting publically exposed Version Control System
Slides null puliya linux basics
Raspberry pi Beginners Session
Career In Information security
Avr introduction
Can Security Vulnerability Disclosure Processes Be Responsible, Rational and ...
Demystifying captcha Bangalore Meet April 18
Browser Exploit Framework
The Shellshocker
Secuirty News Bytes-Bangalore may 2014
IE Memory Protector
Owasp Mobile Top 10 – 2014
Ad

Similar to Tale of Forgotten Disclosure and Lesson learned (20)

PPT
I os note kenlai-2014 mar
PDF
How to adapt the SDLC to the era of DevSecOps
PPTX
Word campktm speed-security
PDF
Deep Exploit@Black Hat Europe 2018 Arsenal
PDF
What's New in AppFuse 2.0
PPTX
WordPress Upgrades: Read, Set, Go!
PPT
Patch Management - 2013
PDF
Android mobile app security offensive security workshop
DOCX
Google Hacking Lab ClassNameDate This is an introducti.docx
PDF
Continuous delivery
PPTX
Open Source Libraries - Managing Risk in Cloud
PPTX
#ATAGTR2021 Presentation - "Selenium 4 Observability – a 90 Min Hands on Lab"
PPTX
Manual JavaScript Analysis Is A Bug
PDF
WordPress Security Essentials WordCamp Denver 2012
PDF
Aliens in Your Apps!
PDF
Introducing OWASP OWTF Workshop BruCon 2012
PDF
IE Exploit Protection
PDF
Web application penetration testing lab setup guide
PPTX
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
PDF
Progressive Web Apps by Millicent Convento
I os note kenlai-2014 mar
How to adapt the SDLC to the era of DevSecOps
Word campktm speed-security
Deep Exploit@Black Hat Europe 2018 Arsenal
What's New in AppFuse 2.0
WordPress Upgrades: Read, Set, Go!
Patch Management - 2013
Android mobile app security offensive security workshop
Google Hacking Lab ClassNameDate This is an introducti.docx
Continuous delivery
Open Source Libraries - Managing Risk in Cloud
#ATAGTR2021 Presentation - "Selenium 4 Observability – a 90 Min Hands on Lab"
Manual JavaScript Analysis Is A Bug
WordPress Security Essentials WordCamp Denver 2012
Aliens in Your Apps!
Introducing OWASP OWTF Workshop BruCon 2012
IE Exploit Protection
Web application penetration testing lab setup guide
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
Progressive Web Apps by Millicent Convento

More from Anant Shrivastava (10)

PDF
Diverseccon keynote: My 2 Paisa's on Infosec World
PDF
WhitePaper : Security issues in android custom rom
PDF
Web application finger printing - whitepaper
PDF
Battle Underground NullCon 2011 Walkthrough
PDF
Nullcon Hack IM 2011 walk through
PPT
Embedded Systems : introduction
PPT
introduction to Lamp Stack
PPT
Logic Families Electronics
PPT
Filesystem
PPT
basic knowhow hacking
Diverseccon keynote: My 2 Paisa's on Infosec World
WhitePaper : Security issues in android custom rom
Web application finger printing - whitepaper
Battle Underground NullCon 2011 Walkthrough
Nullcon Hack IM 2011 walk through
Embedded Systems : introduction
introduction to Lamp Stack
Logic Families Electronics
Filesystem
basic knowhow hacking

Recently uploaded (20)

PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Developing a website for English-speaking practice to English as a foreign la...
PPT
What is a Computer? Input Devices /output devices
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Getting started with AI Agents and Multi-Agent Systems
PPTX
Benefits of Physical activity for teenagers.pptx
PPT
Geologic Time for studying geology for geologist
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
DOCX
search engine optimization ppt fir known well about this
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
CloudStack 4.21: First Look Webinar slides
PDF
August Patch Tuesday
PDF
Getting Started with Data Integration: FME Form 101
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
Modernising the Digital Integration Hub
DP Operators-handbook-extract for the Mautical Institute
Developing a website for English-speaking practice to English as a foreign la...
What is a Computer? Input Devices /output devices
1 - Historical Antecedents, Social Consideration.pdf
Getting started with AI Agents and Multi-Agent Systems
Benefits of Physical activity for teenagers.pptx
Geologic Time for studying geology for geologist
sustainability-14-14877-v2.pddhzftheheeeee
Final SEM Unit 1 for mit wpu at pune .pptx
Group 1 Presentation -Planning and Decision Making .pptx
A novel scalable deep ensemble learning framework for big data classification...
Zenith AI: Advanced Artificial Intelligence
Univ-Connecticut-ChatGPT-Presentaion.pdf
search engine optimization ppt fir known well about this
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
CloudStack 4.21: First Look Webinar slides
August Patch Tuesday
Getting Started with Data Integration: FME Form 101
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Modernising the Digital Integration Hub

Tale of Forgotten Disclosure and Lesson learned