Wordpress Multiple Third Party Plugins Multiple Vulnerabilities
Description
(#Several vulnerabilities have been identified in third party plugins for WordPress:#- Blubrry PowerPress Podcasting: cross-site scripting via the POST parameter "tab" of the page "wp-admin/admin.php?page=powerpress/powerpressadmin_basic.php"##- Fast Secure Contact Form: cross-site scripting via the POST parameter "fs_contact_form1[welcome]" of the page "wp-admin/plugins.php?page=si-contact-form%2Fsi-contact-form.php"##- BulletProof Security: cross-site scripting via the POST parameter "DBTablePrefix" of the page "wp-admin/admin.php?page=bulletproof-security/admin/db-backup-security/db-backup-security.php"##- NextGEN Gallery by Photocrati: several cross-site scripting##- NextGEN Gallery by Photocrati: remote file upload due to improper poor filtering of file extensions. This vulnerability is exploitable via the POST parameter "name" of the page "wp-admin/post-new.php?post_type=wpsc-product"##- WP-DB-Backup: information disclosure allowing to download Wordpress database. This vulnerability is only exploitable if you choose "local" as a backup repository (not by default)##- Crony Cronjob Manager: cross-site scripting and cross-site request forgery the POST parameter "name"##- Form Manager: arbitrary code execution (CVE-2015-7806)##- wp-championship : blind SQL Injection. This vulnerability is located in the "isadmin" parameter of the "wp-admin/wp-championship/cs_admin_users.php" web page. To exploit it, the attacker must be authenticated.##Exploitation codes are available for the vulnerabilities affecting plugins WP-DB-Backup and Form Manager.##Proofs of concept are available.)
Vulnerable Products
Vulnerable Software: WordPress (WordPress) -
Solution
Version 5.9 of the wp-championship plugin fixes the CVE-2015-5308 vulnerability.