WordPress Third-Party Modules Multiple Vulnerabilities


Description   (#Several vulnerabilities have been identified in third-party plugins for WordPress:#- NextGEN Gallery: authenticated remote code execution#- Insert Html Snippet: cross-site request forgery#- WP Vault: local file inclusion in the "wpv-image" parameter#- WP Whois Domain: cross-site scripting##Proofs of concept are available.)
     
Vulnerable Products   Vulnerable Software:
WordPress (WordPress) -
     
Solution   - Insert Html Snippet: 1.2.1.
     
CVE  
     
References   - pluginvulnerabilities : Authenticated Remote Code Execution (RCE) Vulnerability in NextGEN Gallery
https://www.pluginvulnerabilities.com/2016/11/28/authenticated-remote-code-execution-rce-vulnerability-in-nextgen-gallery/
- sumofpwn : Cross-Site Request Forgery in Insert Html Snippet WordPress Plugin
https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_insert_html_snippet_wordpress_plugin.html
- exploit-db : Wordpress Plugin WP Vault 0.8.6.6 - Local File Inclusion
https://www.exploit-db.com/exploits/40850/
- PluginVulnerabilities : Reflected Cross-Site Scripting (XSS) Vulnerability in WP Whois Domain
https://www.pluginvulnerabilities.com/2016/11/28/vulnerability-details-reflected-cross-site-scripting-xss-vulnerability-in-wp-whois-domain/
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
Misc : Directory traversal - parameter starting with ../
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
Directory traversal using ..\..
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
Directory traversal
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
Directory traversal backward root folder
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
Upload of a PHP file in a vulnerable web application
5.0.0
Suspicious access to a php file in a vulnerable application upload directory
5.0.0
     


 
 
 
 
 Risk level 
Moderate 

 Vulnerability First Public Report Date 
2016-11-28 

 Target Type 
Server 

 Possible exploit 
Remote