TALE OF FORGOTTEN
DISCLOSURE
BY
ANANT SHRIVASTAVA
ANANT SHRIVASTAVA
Information Security Consultant
Admin - Dev - Security
null + OWASP + G4H
and @anantshri
Co-Author OWASP Testing Guide 4.0
Projects
http://anantshri.info
     
SCENARIO
1. A vulnerability present in code (last updated March 2013)
2. Public disclosure in aug 2014.
3. Interestingly someone posted a pull request in Jan 2013
4. Till may 2015 it was not patched even though there was a new release after the
pull request was in place.
INFORMATION RECIEVED
INVESTIGATION RESULT
1. Javascript Based DOM-XSS
2. Culprit identified as facebook-page-photo-gallery wordpress plugin.
3. Remove the plugin
4. XSS Fixed; Issue closed
5. End of Story
EMAIL TO PLUGINS TEAM
RESPONSE FROM PLUGIN TEAM
MEANWHILE
DISCOVERY REQUIRES EXPERIMENTATION
REPOSITORY
CRUX OF THE ISSUE
function getHashtag(){
var url = location.href;
hashtag = (url.indexOf('#prettyPhoto') !== -1) ? decodeURI(url.substring(url.indexOf('#pretty
Photo')+1,url.length)) : false;
return hashtag;
};
GOOGLE AHOY
INTERESTING FACT
CONTACTING AUTHOR
SPREAD THE WORD
SPREAD THE WORD
SPREAD THE WORD
FINALLY SOME ACTION
SOME ACTION
RELIEVED
LET THE WORLD BE IN PEACE
AND
LETS GET BACK TO WORK
AFTER 7 DAYS
WHY YOU NO FIX
WORDPRESS PLUGIN INFO
1. Total 35 Plugins Found
Total Plugin Downloads Active Install
2882520 3,37,780
NERDY DATA
WHAT IS VULNERABLE
1. Any application / website which has jquery.prettyphoto.js
2. Version 3.1.4 and 3.1.5 are confirmed vulnerable older versions not checked.
WHAT IS A FIX
1. Upgrade to 3.1.6
ENOUGH OF THE PAST
WHAT'S IN IT FOR ME.
LESSONS TO BE LEARNED
FOR DEVELOPER
1. Never ignore pull requests and security issue bug report.
2. Proactively test software and at-least if a fix is released publicly accept security
issue.
FOR DEVELOPERS / SYSADMIN /
DEVOPS
1. never ignore update from shared library
2. Keep an eye on how shared resources are holding up.
3. Monitor your Dependencies
HOW
HOW
HOW
IS THIS ENOUGH
1. Not yet
2. We still lack method to track it for every third party library.
3. Manual tracking is still required.
REFERENCES
1. A9 - Using Components with Known Vulnerabilities
2. https://www.owasp.org/index.php/Top_10_2013-A9-
Using_Components_with_Known_Vulnerabilities
THANKS

More Related Content

PDF
My tryst with sourcecode review
PDF
When the internet bleeded : RootConf 2014
PDF
Security Issues in Android Custom ROM
PDF
Null bhopal Sep 2016: What it Takes to Secure a Web Application
PDF
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
PDF
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
PDF
SSL Pinning and Bypasses: Android and iOS
PDF
Hijacking Softwares for fun and profit
My tryst with sourcecode review
When the internet bleeded : RootConf 2014
Security Issues in Android Custom ROM
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
SSL Pinning and Bypasses: Android and iOS
Hijacking Softwares for fun and profit

What's hot (20)

PPTX
[Wroclaw #5] OWASP Projects: beyond Top 10
PPTX
[Wroclaw #2] Web Application Security Headers
PDF
REST API Pentester's perspective
PDF
Ground Zero Training- Metasploit For Web
PDF
Make CSRF Again
PPT
Web2.0 : an introduction
PDF
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
PDF
[Wroclaw #7] Why So Serial?
PPT
[Php Camp]Owasp Php Top5+Csrf
PDF
Web Security... Level Up
PDF
Nessus and Reporting Karma
PDF
HackFest 2015 - Rasp vs waf
PDF
20+ Ways to Bypass Your macOS Privacy Mechanisms
PPTX
Cyber ppt
PPTX
OSX/Pirrit: The blue balls of OS X adware
PDF
Building & Hacking Modern iOS Apps
PPTX
Bug Bounty #Defconlucknow2016
PDF
Hacking Vulnerable Websites to Bypass Firewalls
PDF
Testing iOS apps without jailbreak in 2018
[Wroclaw #5] OWASP Projects: beyond Top 10
[Wroclaw #2] Web Application Security Headers
REST API Pentester's perspective
Ground Zero Training- Metasploit For Web
Make CSRF Again
Web2.0 : an introduction
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
[Wroclaw #7] Why So Serial?
[Php Camp]Owasp Php Top5+Csrf
Web Security... Level Up
Nessus and Reporting Karma
HackFest 2015 - Rasp vs waf
20+ Ways to Bypass Your macOS Privacy Mechanisms
Cyber ppt
OSX/Pirrit: The blue balls of OS X adware
Building & Hacking Modern iOS Apps
Bug Bounty #Defconlucknow2016
Hacking Vulnerable Websites to Bypass Firewalls
Testing iOS apps without jailbreak in 2018
Ad

Viewers also liked (20)

PDF
OWASP Bangalore : OWTF demo : 13 Dec 2014
PPTX
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
PDF
Android Tamer BH USA 2016 : Arsenal Presentation
PDF
Snake bites : Python for Pentesters
PDF
Android Tamer: Virtual Machine for Android (Security) Professionals
PDF
Exploiting publically exposed Version Control System
PDF
Slides null puliya linux basics
PDF
Raspberry pi Beginners Session
PPTX
Career In Information security
PPT
Avr introduction
PDF
Can Security Vulnerability Disclosure Processes Be Responsible, Rational and ...
PDF
Demystifying captcha Bangalore Meet April 18
PDF
Browser Exploit Framework
PPTX
The Shellshocker
PDF
Secuirty News Bytes-Bangalore may 2014
PPTX
IE Memory Protector
PDF
Owasp Mobile Top 10 – 2014
OWASP Bangalore : OWTF demo : 13 Dec 2014
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Android Tamer BH USA 2016 : Arsenal Presentation
Snake bites : Python for Pentesters
Android Tamer: Virtual Machine for Android (Security) Professionals
Exploiting publically exposed Version Control System
Slides null puliya linux basics
Raspberry pi Beginners Session
Career In Information security
Avr introduction
Can Security Vulnerability Disclosure Processes Be Responsible, Rational and ...
Demystifying captcha Bangalore Meet April 18
Browser Exploit Framework
The Shellshocker
Secuirty News Bytes-Bangalore may 2014
IE Memory Protector
Owasp Mobile Top 10 – 2014
Ad

Similar to Tale of Forgotten Disclosure and Lesson learned (20)

PPT
I os note kenlai-2014 mar
PDF
How to adapt the SDLC to the era of DevSecOps
PPTX
Word campktm speed-security
PDF
Deep Exploit@Black Hat Europe 2018 Arsenal
PDF
What's New in AppFuse 2.0
PPTX
WordPress Upgrades: Read, Set, Go!
PPT
Patch Management - 2013
PDF
Android mobile app security offensive security workshop
DOCX
Google Hacking Lab ClassNameDate This is an introducti.docx
PDF
Continuous delivery
PPTX
Open Source Libraries - Managing Risk in Cloud
PPTX
#ATAGTR2021 Presentation - "Selenium 4 Observability – a 90 Min Hands on Lab"
PPTX
Manual JavaScript Analysis Is A Bug
PDF
WordPress Security Essentials WordCamp Denver 2012
PDF
Aliens in Your Apps!
PDF
Introducing OWASP OWTF Workshop BruCon 2012
PDF
IE Exploit Protection
PDF
Web application penetration testing lab setup guide
PPTX
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
PDF
Progressive Web Apps by Millicent Convento
I os note kenlai-2014 mar
How to adapt the SDLC to the era of DevSecOps
Word campktm speed-security
Deep Exploit@Black Hat Europe 2018 Arsenal
What's New in AppFuse 2.0
WordPress Upgrades: Read, Set, Go!
Patch Management - 2013
Android mobile app security offensive security workshop
Google Hacking Lab ClassNameDate This is an introducti.docx
Continuous delivery
Open Source Libraries - Managing Risk in Cloud
#ATAGTR2021 Presentation - "Selenium 4 Observability – a 90 Min Hands on Lab"
Manual JavaScript Analysis Is A Bug
WordPress Security Essentials WordCamp Denver 2012
Aliens in Your Apps!
Introducing OWASP OWTF Workshop BruCon 2012
IE Exploit Protection
Web application penetration testing lab setup guide
Aliens in Your Apps! Are You Using Components With Known Vulnerabilities?
Progressive Web Apps by Millicent Convento

More from Anant Shrivastava (10)

PDF
Diverseccon keynote: My 2 Paisa's on Infosec World
PDF
WhitePaper : Security issues in android custom rom
PDF
Web application finger printing - whitepaper
PDF
Battle Underground NullCon 2011 Walkthrough
PDF
Nullcon Hack IM 2011 walk through
PPT
Embedded Systems : introduction
PPT
introduction to Lamp Stack
PPT
Logic Families Electronics
PPT
Filesystem
PPT
basic knowhow hacking
Diverseccon keynote: My 2 Paisa's on Infosec World
WhitePaper : Security issues in android custom rom
Web application finger printing - whitepaper
Battle Underground NullCon 2011 Walkthrough
Nullcon Hack IM 2011 walk through
Embedded Systems : introduction
introduction to Lamp Stack
Logic Families Electronics
Filesystem
basic knowhow hacking

Recently uploaded (20)

PPTX
Training Program for knowledge in solar cell and solar industry
PPTX
Configure Apache Mutual Authentication
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
DOCX
search engine optimization ppt fir known well about this
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Statistics on Ai - sourced from AIPRM.pdf
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPTX
Internet of Everything -Basic concepts details
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PPTX
Microsoft User Copilot Training Slide Deck
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
Training Program for knowledge in solar cell and solar industry
Configure Apache Mutual Authentication
4 layer Arch & Reference Arch of IoT.pdf
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Consumable AI The What, Why & How for Small Teams.pdf
Rapid Prototyping: A lecture on prototyping techniques for interface design
search engine optimization ppt fir known well about this
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
MuleSoft-Compete-Deck for midddleware integrations
Taming the Chaos: How to Turn Unstructured Data into Decisions
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Statistics on Ai - sourced from AIPRM.pdf
giants, standing on the shoulders of - by Daniel Stenberg
sustainability-14-14877-v2.pddhzftheheeeee
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Internet of Everything -Basic concepts details
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Microsoft User Copilot Training Slide Deck
Data Virtualization in Action: Scaling APIs and Apps with FME

Tale of Forgotten Disclosure and Lesson learned