WordPress Third-Party Plugins and Themes Multiple Vulnerabilities
Description
(#Multiple vulnerabilities have been reported in multiple third-party plugins and themes for WordPress:#- Another Wordpress Classifieds: cross-site scripting#- Another Wordpress Classifieds: time-based blind SQL injection via the POST parameter "keywordphrase" with a "page_id" GET parameter#- Contact Form Clean and Simple: cross-site scripting via parameter "cscf[name]" of the web page "contact-us/" (CVE-2014-8955)#- WP-DB-Backup: vulnerability allowing the download of a database backup#- SupportEzzy: cross-site scripting (CVE-2014-9179)#- CM Download Manager: arbitrary code injection via parameter "CMDsearch" of the page "cmdownloads/" (CVE-2014-8877)#- WP-Statistics: stored cross-site scripting#- SP Client Document Manager: several SQL injection via several parameters : "vendor_email" of the page "ajax.php?function=email-vendor", "id" of the page "/ajax.php?function=downloa#d-project", "id" of the page "ajax.php?function=download-archive" and "id" of the page "ajax.php?function=remove-category"#- YourMembers: SQL injection via parameter "ym_download_id"##Proofs of concept are available, except for plugin WP-Statistics.##An exploitation code is available for the vulnerability affecting WP-DB-Backup plugin.#Updated, 13/11/2015:#A detection code is available for the CVE-2014-8877 vulnerability.)