WordPress Third-Party Plugins Multiple Vulnerabilities


Description   (#Several vulnerabilities have been identified in third-party plugins for WordPress:#- Several SQL injection in Mail Masta :#* CVE-2017-6095 : HTTP GET request via the "list_id" parameter (unauthenticated)#* CVE-2017-6096 : HTTP GET request via the "filter_list" parameter (admin right needed)#* CVE-2017-6097 : HTTP POST request via the "camp_id" parameter (admin right needed)#* CVE-2017-6098 : HTTP POST request via the "list_id" parameter (admin right needed)##- RockHoist Badges : stored cross-site scripting#- ByREV WP-PICShield : cross-site request forgery#- AnyVar : stored cross-site scripting#- Democracy Poll : cross-site scripting and cross-site request forgery#- GTranslate : unauthenticated open redirect##Proofs of concept are available.)
     
Vulnerable Products   Vulnerable Software:
WordPress (WordPress) -
     
Solution  
     
CVE   CVE-2017-6098
CVE-2017-6097
CVE-2017-6096
CVE-2017-6095
     
References   - cxsecurity : WordPress Mail Masta 1.0 SQL Injection
https://cxsecurity.com/issue/WLB-2017020228
- wpvulndb : ByREV WP-PICShield - Cross-Site Request Forgery (CSRF)
https://wpvulndb.com/vulnerabilities/8738
- wpvulndb : GTranslate <= 2.8.10 - Unauthenticated Open Redirect
https://wpvulndb.com/vulnerabilities/8739
- vapidlabs : Persistent XSS in wordpress plugin rockhoist-badges v1.2.2
http://www.vapidlabs.com/advisory.php?v=176
- Persistent XSS Vulnerability in Wordpress plugin AnyVar v0.1.1
http://www.vapidlabs.com/advisory.php?v=177
- pluginvulnerabilities : Cross-Site Request Forgery (CSRF)/Cross-Site Scripting (XSS) Vulnerability in Democracy Poll
https://www.pluginvulnerabilities.com/2017/02/22/cross-site-request-forgery-csrfcross-site-scripting-xss-vulnerability-in-democracy-poll/
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
SQL injection Prevention - GET : suspicious OR statement in URL
3.2.0
SQL injection Prevention - GET : suspicious combination of 'OR' or 'AND' statements in URL
3.2.0
SQL injection Prevention - GET : suspicious CREATE statement in URL
3.2.0
SQL injection Prevention - GET : suspicious CAST statement in URL
3.2.0
SQL injection Prevention - GET : suspicious OPENROWSET statement in URL
3.2.0
SQL injection Prevention - GET : suspicious DECLARE statement in URL
3.2.0
SQL injection Prevention - GET : suspicious OPENQUERY statement in URL
3.2.0
SQL injection Prevention - GET : suspicious shutdown statement in URL
3.2.0
SQL injection Prevention - GET : suspicious UNION SELECT statement in URL
3.2.0
SQL injection Prevention - GET : possible database version probing
3.2.0
SQL injection Prevention - GET : suspicious UPDATE SET statement in URL
3.2.0
SQL injection Prevention - GET : suspicious SELECT statement in URL
3.2.0
SQL injection Prevention - GET : suspicious INSERT statement in URL
3.2.0
SQL injection Prevention - GET : suspicious DROP statement in URL
3.2.0
SQL injection Prevention - GET : suspicious EXEC statement in URL
3.2.0
SQL injection Prevention - GET : block comment delimiters in URL
3.2.0
SQL injection Prevention - POST : suspicious UPDATE statement in data
5.0.0
SQL injection Prevention - POST : suspicious SELECT statement in data
5.0.0
SQL injection Prevention - POST : suspicious DECLARE statement in data
5.0.0
SQL injection Prevention - POST : suspicious OPENROWSET statement in data
5.0.0
SQL injection Prevention - POST : suspicious OPENQUERY statement in data
5.0.0
SQL injection Prevention - GET : suspicious combination of 'select' and 'sleep' statements in URL
5.0.0
SQL injection Prevention - POST : suspicious CAST statement in data
5.0.0
SQL injection Prevention - GET : Evasion attempt with CAST and EXEC statements
5.0.0
SQL injection Prevention - POST : suspicious EXEC statement in data
5.0.0
SQL injection Prevention - POST : suspicious CREATE statement in data
5.0.0
SQL injection Prevention - POST : suspicious INSERT statement in data
5.0.0
SQL injection Prevention - GET : Authentication bypass attempt with OR statement
5.0.0
SQL injection Prevention - POST : suspicious DROP statement in data
5.0.0
SQL injection Prevention - POST : suspicious HAVING statement in data
5.0.0
SQL injection Prevention - POST : suspicious UNION statement in data
5.0.0
SQL injection Prevention - POST : suspicious OR statement in data
5.0.0
SQL injection Prevention - POST : possible version probing in data
5.0.0
SQL injection Prevention - GET : suspicious SQL keywords in URL
5.0.0
     


 
 
 
 
 Risk level 
High 

 Vulnerability First Public Report Date 
2017-02-20 

 Target Type 
Client 

 Possible exploit 
Remote