Wordpress Multiple Third Party Plugins Multiple Vulnerabilities
Description
(#Several vulnerabilities have been identified in third-party plugins for WordPress:#- WP Mailto Links: stored cross-site scripting#- Email Encoder Bundle: stored cross-site scripting#- Soundy Background Music: cross-site scripting#- DW Question & Answer: stored cross-site scripting#- Custom Content Type Manager: multiple vulnerabilities#- Site Import: local and remote file inclusion#- Nextend Facebook Connect: cross-site request forgery#- Bulletproof: cross-site scripting#- Cerber Limit Login Attempts: stored cross-site scripting#- Advanced Video: local file inclusion##Proof of concepts are available.)
Vulnerable Products
Vulnerable Software:
WordPress (WordPress) -
Solution
- Cerber Limit Login Attempts: 2.7
CVE
References
- Cxsecurity : WordPress WP Mailto Links 2.0.1 - Stored Cross Site Scripting
https://cxsecurity.com/issue/WLB-2016030062
- Cxsecurity : WordPress Email Encoder Bundle 1.4.3 - Stored Cross Site Scripting
https://cxsecurity.com/issue/WLB-2016030061
- Wpvulndb : Soundy Background Music <= 3.1 - Reflected Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8414
- Wpvulndb : DW Question & Answer <= 1.4.2.2 - Stored Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8413
- Wpvulndb : Custom Content Type Manager >= 0.9.8.8 - Multiple Vulnerabilities
https://wpvulndb.com/vulnerabilities/8410
- Exploit-db : Wordpress Site Import Plugin 1.0.1 - Local and Remote File Inclusion
https://www.exploit-db.com/exploits/39558/
- Wpvulndb : Nextend Facebook Connect <= 1.5.7 - Cross-Site Request Forgery (CSRF)
https://wpvulndb.com/vulnerabilities/8417
- 0day.today : WordPress Bulletproof 0.53.2 Cross Site Scripting Vulnerability
http://0day.today/exploit/25078
- Wpvulndb : Cerber Limit Login Attempts <= 2.0.1.6 - Unauthenticated Stored XSS
https://wpvulndb.com/vulnerabilities/8430
- Exploit-db : WordPress Advanced Video Plugin 1.0 - Local File Inclusion (LFI)
https://www.exploit-db.com/exploits/39646/
- Packetstormsecurity : WordPress Advanced Video 1.0 Local File Inclusion
https://packetstormsecurity.com/files/136566/wpavp-lfi.txt
Vulnerability Manager Detection
No
IPS Protection
ASQ Engine alarm
Available Since
Misc : Directory traversal - parameter starting with ../
3.2.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
3.2.0
Directory traversal using ..\..
3.2.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
3.2.0
Directory traversal
3.2.0
PHP : Remote file inclusion prevention : URL found as parameter
3.2.0
Directory traversal backward root folder
3.2.0
Misc : Local File Inclusion - suspicious /etc/passwd found in URL
3.5.0
XSS - Prevention - POST : suspicious 'style' tag found in data
5.0.0
XSS - Prevention - POST : javascript code found in data
5.0.0
XSS - Prevention - POST : suspicious tag with event found in data
5.0.0
Wordpress plugin doing suspicious request.
5.0.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
5.0.0
XSS - Prevention - POST : 'location' javascript object found in data
5.0.0
XSS - Prevention - POST : code allowing cookie access found in data
5.0.0
XSS - Prevention - POST : 'script' tag found in data
5.0.0
XSS - Prevention : suspicious 'script' tag found in header
5.0.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'div' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'object' tag found in data
5.0.0
PHP : RFI attack attempt on a vulnerable application
5.0.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
5.0.0
Risk level
Moderate
Vulnerability First Public Report Date
2016-04-08
Target Type
Server
Possible exploit
Remote