Wordpress Multiple Third Party Plugins Multiple Vulnerabilities


Description   (#Several vulnerabilities have been identified in third party plugins for WordPress:#- EZ Google Analytics: cross-site scripting in the "ezga_settings_array[tracking_id]" variable. To exploit this vulnerability, the attacker must be connected to the administration interface#- EZ Portfolio: cross-site scripting in the "ez_[2-6]col_width" variables#- DukaPress: cross-site scripting in several parameters. To exploit this vulnerability, the attacker must be connected to the administration panel#- Ajax Load More: arbitrary file upload in the "admin-ajax.php" page#- Visual Composer: cross-site scripting#- AlertWire: information disclosure in the "/wp-content/plugins/alertwire/alertwire.php" page displaying the absolute path of the page when an error occurs##Proof of concept are available.#Updated, 06/11/2015:#An exploitation code has been added to the Metasploit framework for the Ajax Load More vulnerability.)
     
Vulnerable Products   Vulnerable Software:
WordPress (WordPress) -
     
Solution   - Visual Composer: 4.7.4
     
CVE  
     
References   - 0day: Wordpress EZ Google Analytics Plugin 4.1.6 - Persistant XSS Vulnerability
http://0day.today/exploit/24406
- 0day: Wordpress EZ Portfolio 1.0.1 plugin - Multiple Persistant XSS Vulnerability
http://0day.today/exploit/24405
- 0day: Wordpress DukaPress Plugin - Persistent XSS Vulnerability
http://0day.today/exploit/24400
- Wpvulndb: Ajax Load More <= 2.8.1.1 - Authenticated File Upload & Deletion
https://wpvulndb.com/vulnerabilities/8209
- Wpvulndb: Visual Composer <= 4.7.3 - Multiple Unspecified Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8208
- 0day: Wordpress AlertWire 1.1.1 Plugin - Full Path Disclosure Vulnerability
http://0day.today/exploit/24411
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Authenticated File Upload in Ajax load more <= 2.8.1.1
5.0.0
     


 
 
 
 
 Risk level 
Low 

 Vulnerability First Public Report Date 
2015-10-10 

 Target Type 
Server 

 Possible exploit 
Remote