Wordpress Multiple Third Party Plugins Multiple Vulnerabilities


Description   (#Multiple vulnerabilities have been identified in plugins for Wordpress:##- Alpine PhotoTile for Instagram: cross-site scripting#- Image Gallery: authenticated cross-site scripting#- Visitor Maps and Who's Online: authenticated persistent cross-site scripting#- WP Google Map Plugin: authenticated cross-site scripting#- WP Job Manager: cross-site scripting#- Easy Social Icons: authenticated SQL injection#- My Link Order: authenticated cross-site scripting#- WP Database Backup: authenticated persistent cross-site scripting#- Theme Test Drive: cross-site scripting#- Auto-thickbox-plus: cross-site scripting#- Double-opt-in-for-download: SQL injection##Proofs-of-concept exist for the following vulnerabilities:#- Alpine PhotoTile for Instagram#- Image Gallery#- Visitor Maps and Who's Online#- WP Google Map Plugin#- WP Job Manager#- Easy Social Icons#- WP Database Backup#- Theme Test Drive#- Auto-thickbox-plus)
     
Vulnerable Products   Vulnerable Software:
WordPress (WordPress) -
     
Solution   - Theme Test Drive: 2.9.1
     
CVE   CVE-2015-7517
     
References   - WPVulnDB : Alpine PhotoTile for Instagram <= 1.2.7.5 - Authenticated Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8268
- WPVulnDB : Image Gallery <= 1.5.1 - Authenticated Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8269
- WPVulnDB : Visitor Maps and Who's Online <= 1.5.8.6 - Authenticated Persistent Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8270
- WPVulnDB : WP Google Map Plugin <= 2.3.9 - Authenticated Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8271
- WPVulnDB : WP Job Manager <= 1.23.7 - Unauthenticated Reflected Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8272
- WPVulnDB : Easy Social Icons <= 1.2.3.1 - Authenticated SQL Injection
https://wpvulndb.com/vulnerabilities/8273
- WPVulnDB : My Link Order <= 4.3 - Authenticated Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8274
- WPVulnDB : WP Database Backup <= 3.3 - Authenticated Persistent Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8275
- WPVulnDB : Theme Test Drive <= 2.9 - Authenticated File Upload & XSS
https://wpvulndb.com/vulnerabilities/8276
- 0day.today : Wordpress auto-thickbox-plus plugin XSS Vulnerability
http://0day.today/exploit/24609
- DHS Advisory : SQL injection in wordpress plugin double-opt-in-for-download v2.0.8
http://www.vapid.dhs.org/advisory.php?v=157
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious OR statement in URL
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious combination of 'OR' or 'AND' statements in URL
3.2.0
SQL injection Prevention - GET : suspicious CREATE statement in URL
3.2.0
SQL injection Prevention - GET : suspicious CAST statement in URL
3.2.0
SQL injection Prevention - GET : suspicious OPENROWSET statement in URL
3.2.0
SQL injection Prevention - GET : suspicious DECLARE statement in URL
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious OPENQUERY statement in URL
3.2.0
SQL injection Prevention - GET : suspicious shutdown statement in URL
3.2.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
3.2.0
SQL injection Prevention - GET : suspicious UNION SELECT statement in URL
3.2.0
SQL injection Prevention - GET : possible database version probing
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
SQL injection Prevention - GET : suspicious UPDATE SET statement in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious SELECT statement in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious INSERT statement in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
SQL injection Prevention - GET : suspicious DROP statement in URL
3.2.0
SQL injection Prevention - GET : suspicious EXEC statement in URL
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
SQL injection Prevention - GET : block comment delimiters in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious 'style' tag found in data
5.0.0
XSS - Prevention - POST : javascript code found in data
5.0.0
XSS - Prevention - POST : suspicious tag with event found in data
5.0.0
SQL injection Prevention - POST : suspicious UPDATE statement in data
5.0.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
5.0.0
SQL injection Prevention - POST : suspicious SELECT statement in data
5.0.0
XSS - Prevention - POST : 'location' javascript object found in data
5.0.0
SQL injection Prevention - POST : suspicious DECLARE statement in data
5.0.0
SQL injection Prevention - POST : suspicious OPENROWSET statement in data
5.0.0
SQL injection Prevention - POST : suspicious OPENQUERY statement in data
5.0.0
SQL injection Prevention - GET : suspicious combination of 'select' and 'sleep' statements in URL
5.0.0
XSS - Prevention - POST : code allowing cookie access found in data
5.0.0
SQL injection Prevention - POST : suspicious CAST statement in data
5.0.0
SQL injection Prevention - GET : Evasion attempt with CAST and EXEC statements
5.0.0
SQL injection Prevention - POST : suspicious EXEC statement in data
5.0.0
SQL injection Prevention - POST : suspicious CREATE statement in data
5.0.0
SQL injection Prevention - POST : suspicious INSERT statement in data
5.0.0
SQL injection Prevention - GET : Authentication bypass attempt with OR statement
5.0.0
XSS - Prevention - POST : 'script' tag found in data
5.0.0
SQL injection Prevention - POST : suspicious DROP statement in data
5.0.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
5.0.0
SQL injection Prevention - POST : suspicious HAVING statement in data
5.0.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
5.0.0
SQL injection Prevention - POST : suspicious UNION statement in data
5.0.0
XSS - Prevention - POST : suspicious 'div' tag found in data
5.0.0
SQL injection Prevention - POST : suspicious OR statement in data
5.0.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'object' tag found in data
5.0.0
SQL injection Prevention - POST : possible version probing in data
5.0.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
5.0.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2015-11-25 

 Target Type 
Server 

 Possible exploit 
Remote