Description
|
|
Several vulnerabilities have been identified in plugins for WordPress:
- StageShow: open redirect using the "url" parameter in the "stageshow_redirect.php" page (CVE-2015-5461)
- Ninja Forms: cross-site scripting in Admin Action Settings
- Albo Pretorio Online: multiple vulnerabilities (SQL injection, CSRF, XSS, shell uploading)
- Ultra Users: SQL injection via the "data_target" and "data_vote" parameters, located in the "admin-ajax.php" page (CVE-2015-4109)
- MDC YouTube Downloader: local file inclusion via the parameter "file" of the page "download.php" (CVE-2015-5469)
- WP e-Commerce Styling Shop: local file inclusion via the parameter "filename" of the page "download.php"
- S3Bubble Cloud Video With Adverts & Analytics: Arbitrary File Download via the parameter "name" of the page "downloader.php"
- ACF Frontend display: arbitrary file upload via the parameter "files" of action "upload"
- Custom Content Type Manager: remote php code execution by a user with administrator permissions (CVE-2015-3173)
- Swim Team: local file inclusion via the parameters "file" and "filename" of the page "download.php" (CVE-2015-5471)
- YOP Poll: cross-site scripting located in the function "yop_poll_set_wordpress_vote ()" declared in the page "yop-poll/inc/admin.php"
- InfiniteWP Client : unspecified critical vulnerability
- IBS Mappro: directory traversal via the parameter "file" in the page "download.php" (CVE-2015-5472)
- GD bbPress Attachments: cross-site scripting via the parameter "tab" on the page "forms/panels.php"
- GD bbPress Attachments: local file inclusion, located in the "wp-admin / edit.php". Exploitation of this vulnerability requires administrative privileges
- WP Attachment Export: arbitrary file download via the parameters "content" and "wp-attachment-download-export" of the page "wp-admin/tools.php".
Proofs of concept are available.
An exploitation code is available for "S3Bubble Cloud Video With Adverts & Analytics" plugin.
|