Wordpress Multiple Third Party Plugins Multiple Vulnerabilities


Description   (#Multiple vulnerabilities have been identified in plugins for Wordpress:#- My Category Order : post authentication cross-site scripting#- Easy Table : post authentication cross-site scripting#- WP Google Fonts : post authentication cross-site scripting#- Social Bookmarking Light : post authentication cross-site scripting#- Category Order and Taxonomy Terms Order : post authentication cross-site scripting#- My Page Order : post authentication cross-site scripting#- Display Widgets : post authentication cross-site scripting#- AddThis Sharing Buttons : post authentication cross-site scripting#- All In One WP Security & Firewall : post authentication cross-site scripting#- Duplicator : post authentication cross-site scripting#- CKEditor : post authentication cross-site scripting#- Pretty Link Lite : post authentication SQL injection#- SEO SearchTerms Tagging : post authentication SQL injection#- Contact Form Builder : post authentication SQL injection#- Slider : post authentication SQL injection#- 404 to 301 : post authentication SQL injection#- Master Slider : post authentication SQL injection#- RSS Multi Importer : injection SQL et post authentication cross-site scripting#- Tribulant Slideshow Gallery : arbitrary files upload and cross-site scripting#- Add Link to Facebook : post authentication cross-site scripting#- Floating Social Media Icon : post authentication cross-site scripting#- JW Player 6 : post authentication cross-site scripting#- Google Language Translator : post authentication cross-site scripting#- Dynamic Widgets : post authentication cross-site scripting#- WP-Client : stored cross-site scripting.##A proof-of-concept exists for the WP-Client vulnerability.)
     
Vulnerable Products   Vulnerable Software:
WordPress (WordPress) -
     
Solution   - Dynamic Widgets : 1.5.11
     
CVE  
     
References   - wpvulndb : My Category Order <= 4.3 - Authenticated Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8255
- wpvulndb : SEO SearchTerms Tagging <= 2 1.535 - Authenticated SQL Injection
https://wpvulndb.com/vulnerabilities/8248
- wpvulndb : My Page Order <= 4.3 - Authenticated Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8250
- wpvulndb : Easy Table <= 1.5.2 - Authenticated Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8254
- wpvulndb : WP Google Fonts <= 3.1.3 - Authenticated Reflected Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8253
- wpvulndb : WP Social Bookmarking Light <= 1.7.9 - Authenticated Persistent Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8252
- wpvulndb : Category Order and Taxonomy Terms Order <= 1.4.4 - Authenticated Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8251
- wpvulndb : Pretty Link Lite <= 1.6.7 - Authenticated SQL Injection
https://wpvulndb.com/vulnerabilities/8249
- wpvulndb : Display Widgets <= 2.03 - Authenticated Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8247
- wpvulndb : AddThis Sharing Buttons <= 5.0.12 - Authenticated Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8246
- wpvulndb : All In One WP Security & Firewall <= 3.9.7 - Unauthenticated Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8245
- wpvulndb : Duplicator <= 0.5.26 - Authenticated Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8244
- wpvulndb : CKEditor for WordPress <= 4.5.3 - Authenticated Reflected Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8256
- wpvulndb : Add Link to Facebook <= 2.2.7 - Authenticated Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8266
- wpvulndb : JW Player 6 Plugin for Wordpress <= 2.1.14 - Authenticated Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8260
- wpvulndb : WP RSS Multi Importer <= 3.15 - Blind SQL Injection & Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8265
- wpvulndb : Contact Form Builder <= 1.0.24 - Authenticated Blind SQL Injection
https://wpvulndb.com/vulnerabilities/8262
- wpvulndb : Slider <= 2.8.6 - Authenticated Blind SQL Injection
https://wpvulndb.com/vulnerabilities/8257
- wpvulndb : 404 to 301 <= 2.0.2 - Authenticated Blind SQL Injection
https://wpvulndb.com/vulnerabilities/8267
- wpvulndb : Floating Social Media Icon <= 2.1 - Authenticated Persistent Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8261
- wpvulndb : Google Language Translator <= 4.0.9 - Authenticated Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8259
- wpvulndb : Tribulant Slideshow Gallery <= 1.5.3 - Arbitrary file upload & Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8263
- wpvulndb : Master Slider <= 2.5.1 - Authenticated Blind SQL Injection
https://wpvulndb.com/vulnerabilities/8264
- wpvulndb : Dynamic Widgets <= 1.5.10 - Authenticated Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/8258
- exploit-db : WP-Client 3.8.7 - Stored XSS Vulnerability
https://www.exploit-db.com/exploits/38803/
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious OR statement in URL
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious combination of 'OR' or 'AND' statements in URL
3.2.0
SQL injection Prevention - GET : suspicious CREATE statement in URL
3.2.0
SQL injection Prevention - GET : suspicious CAST statement in URL
3.2.0
SQL injection Prevention - GET : suspicious OPENROWSET statement in URL
3.2.0
SQL injection Prevention - GET : suspicious DECLARE statement in URL
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious OPENQUERY statement in URL
3.2.0
SQL injection Prevention - GET : suspicious shutdown statement in URL
3.2.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
3.2.0
SQL injection Prevention - GET : suspicious UNION SELECT statement in URL
3.2.0
SQL injection Prevention - GET : possible database version probing
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
SQL injection Prevention - GET : suspicious UPDATE SET statement in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious SELECT statement in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
SQL injection Prevention - GET : suspicious INSERT statement in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
SQL injection Prevention - GET : suspicious DROP statement in URL
3.2.0
SQL injection Prevention - GET : suspicious EXEC statement in URL
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
SQL injection Prevention - GET : block comment delimiters in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - POST : suspicious 'style' tag found in data
5.0.0
XSS - Prevention - POST : javascript code found in data
5.0.0
XSS - Prevention - POST : suspicious tag with event found in data
5.0.0
SQL injection Prevention - POST : suspicious UPDATE statement in data
5.0.0
XSS - Prevention - POST : suspicious 'embed' tag found in data
5.0.0
SQL injection Prevention - POST : suspicious SELECT statement in data
5.0.0
XSS - Prevention - POST : 'location' javascript object found in data
5.0.0
SQL injection Prevention - POST : suspicious DECLARE statement in data
5.0.0
SQL injection Prevention - POST : suspicious OPENROWSET statement in data
5.0.0
SQL injection Prevention - POST : suspicious OPENQUERY statement in data
5.0.0
SQL injection Prevention - GET : suspicious combination of 'select' and 'sleep' statements in URL
5.0.0
XSS - Prevention - POST : code allowing cookie access found in data
5.0.0
SQL injection Prevention - POST : suspicious CAST statement in data
5.0.0
SQL injection Prevention - GET : Evasion attempt with CAST and EXEC statements
5.0.0
SQL injection Prevention - POST : suspicious EXEC statement in data
5.0.0
SQL injection Prevention - POST : suspicious CREATE statement in data
5.0.0
SQL injection Prevention - POST : suspicious INSERT statement in data
5.0.0
SQL injection Prevention - GET : Authentication bypass attempt with OR statement
5.0.0
XSS - Prevention - POST : 'script' tag found in data
5.0.0
SQL injection Prevention - POST : suspicious DROP statement in data
5.0.0
XSS - Prevention - POST : suspicious 'style' attribute found in data
5.0.0
SQL injection Prevention - POST : suspicious HAVING statement in data
5.0.0
XSS - Prevention - POST : suspicious 'applet' tag found in data
5.0.0
SQL injection Prevention - POST : suspicious UNION statement in data
5.0.0
XSS - Prevention - POST : suspicious 'div' tag found in data
5.0.0
SQL injection Prevention - POST : suspicious OR statement in data
5.0.0
XSS - Prevention - POST : suspicious 'img' attribute found in data
5.0.0
XSS - Prevention - POST : suspicious 'meta' tag found in data
5.0.0
XSS - Prevention - POST : suspicious 'object' tag found in data
5.0.0
SQL injection Prevention - POST : possible version probing in data
5.0.0
XSS - Prevention - POST : suspicious 'iframe' tag found in data
5.0.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2015-11-22 

 Target Type 
Server 

 Possible exploit 
Remote