WordPress Third-Party Plugins Multiple Vulnerabilities


Description   (#Several vulnerabilities have been identified in third-party plugins for WordPress:#- iThemes security: cross-site scripting permanent#- Newsletter: CSRF and cross-site scripting#- Ecwid Ecommerce Shopping Cart: PHP object injection.##Several reflected cross-site scripting vulnerabilities have been identified:#- Portfolio#- WP Editor#- Calendar#- Page Layout Builder: CVE-2016-1000141#- Ajax Random Post: CVE-2016-1000127#- anti-plagiarism: CVE-2016-1000128#- e-search: CVE-2016-1000130, CVE-2016-1000131#- Enhanced Tooltipglossary: CVE-2016-1000132#- Forget About Shortcode Buttons: CVE-2016-1000133#- Hdw Tube: CVE-2016-1000134, CVE-2016-1000135#- Heat Tracker: CVE-2016-1000136#- Hero Maps Pro: CVE-2016-1000137#- Indexisto: CVE-2016-1000138#- New Year Firework: CVE-2016-1000140#- Parsi Font: CVE-2016-1000142#- Photoxhibit: CVE-2016-1000143, CVE-2016-1000144#- Pondol Carousel: CVE-2016-1000145#- Pondol Formmail: CVE-2016-1000146#- Recipes Writer: CVE-2016-1000147#- S3 Video: CVE-2016-1000148#- Simpel Reserveren: CVE-2016-1000149#- Simplified Content: CVE-2016-1000150#- Tera Charts: CVE-2016-1000151#- Tidio Form: CVE-2016-1000152#- Tidio Gallery: CVE-2016-1000153#- Whizz: CVE-2016-1000154#- Wpsolr Search Engine: CVE-2016-1000154.##A remote attacker could exploit them in order to execute arbitrary JavaScript or HTML code by enticing their victim into following a specially formed link.##Proofs of concept is available.)
     
Vulnerable Products   Vulnerable Software:
WordPress (WordPress) -
     
Solution   - Ecwid Ecommerce Shopping Cart: 4.4.4.
     
CVE   CVE-2016-1000155
CVE-2016-1000154
CVE-2016-1000153
CVE-2016-1000152
CVE-2016-1000151
CVE-2016-1000150
CVE-2016-1000149
CVE-2016-1000148
CVE-2016-1000147
CVE-2016-1000146
CVE-2016-1000145
CVE-2016-1000144
CVE-2016-1000143
CVE-2016-1000142
CVE-2016-1000141
CVE-2016-1000140
CVE-2016-1000138
CVE-2016-1000137
CVE-2016-1000136
CVE-2016-1000135
CVE-2016-1000134
CVE-2016-1000133
CVE-2016-1000132
CVE-2016-1000131
CVE-2016-1000130
CVE-2016-1000128
CVE-2016-1000127
CVE-2016-1000126
     
References   - wpvulndb : iThemes Security <= 5.6.1 - Unauthenticated Stored Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8635
- wpvulndb : Calendar <= 1.3.7 - Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8638
- wpvulndb : Portfolio <= 2.1.10 - Reflected Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8637
- wpvuln : WP Editor <= 1.2.6.2 - Multiple Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8636
- packetstormsecurity : WordPress Newsletter 4.6.0 Cross Site Request Forgery / Cross Site Scripting
https://packetstormsecurity.com/files/139138/wpnewsletter460-xssxsrf.txt
- wpvulndb : Ecwid Ecommerce Shopping Cart <= 4.4.3 - Unauthenticated PHP Object Injection
https://wpvulndb.com/vulnerabilities/8588
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious 'style' tag found in data
5.0.0
XSS - Prevention - POST : javascript code found in data
5.0.0
XSS - Prevention - POST : suspicious tag with event found in data
5.0.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
5.0.0
XSS - Prevention - POST : 'location' javascript object found in data
5.0.0
XSS - Prevention - POST : code allowing cookie access found in data
5.0.0
Serialized PHP object in HTTP header
5.0.0
XSS - Prevention - POST : 'script' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'div' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'object' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
5.0.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2016-10-11 

 Target Type 
Server 

 Possible exploit 
Remote