Wordpress Multiple Third Party Plugins Cross-site Scripting Vulnerabilities


Description   (#Several cross-site scripting vulnerabilities were identified in third-party plugins for WordPress:#- indexisto: CVE-2016-77360#- whizz: plugin CVE-2016-77799#- anti-plagiarism: CVE-2016-77035#- page-layout-builder: CVE-2016-77503#- e-search: CVE-2016-77217#- parsi-font: 2016-77506#- defa-online-image-protector: CVE-2016-77193#- new-year-firework: CVE-2016-77475#- simpel-reserveren: CVE-2016-77628#- ajax-random-post: CVE-2016-77022#- admin-font-editor: CVE-2016-77009#- hdw-tube: CVE-2016-77337#- hero-maps-pro: CVE-2016-77341#- photoxhibit: CVE-2016-77517#- pondol-formmail: CVE-2016-77532#- heat-trackr: CVE-2016-77339#- tidio-form: CVE-2016-77726#- simplified-content: CVE-2016-77642#- infusioft: CVE-2016-77364##A remote attacker could exploit them in order to execute arbitrary JavaScript or HTML code by enticing their victim into following a specially formed link.##Proof of concepts are available.)
     
Vulnerable Products   Vulnerable Software:
WordPress (WordPress) -
     
Solution   No solution for the moment.
     
CVE   CVE-2016-77799
CVE-2016-77726
CVE-2016-77642
CVE-2016-77628
CVE-2016-77532
CVE-2016-77517
CVE-2016-77503
CVE-2016-77475
CVE-2016-77364
CVE-2016-77360
CVE-2016-77341
CVE-2016-77339
CVE-2016-77337
CVE-2016-77217
CVE-2016-77193
CVE-2016-77035
CVE-2016-77022
CVE-2016-77009
     
References   - Seclists : 39 XSS vulnerabilities in 35 wordpress plugins
http://seclists.org/oss-sec/2016/q2/63
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious 'style' tag found in data
5.0.0
XSS - Prevention - POST : javascript code found in data
5.0.0
XSS - Prevention - POST : suspicious tag with event found in data
5.0.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
5.0.0
XSS - Prevention - POST : 'location' javascript object found in data
5.0.0
XSS - Prevention - POST : code allowing cookie access found in data
5.0.0
XSS - Prevention - POST : 'script' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'div' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'object' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
5.0.0
     


 
 
 
 
 Risk level 
Low 

 Vulnerability First Public Report Date 
2016-04-12 

 Target Type 
Server 

 Possible exploit 
Remote