Multiple vulnerabilities in WordPress March 15, 2013

Posted: March 15, 2013 in Vulnerabilities
Tags: , , , ,

WordPress vulnerabilities

WordPress vulnerabilities

Vulnerability: Security Bypass WordPress MailUp

Danger level: Avarage
Patch: None
Number of vulnerabilities: 1

CVE ID: CVE-2013-0731
Vector of operation: Remote
Impact: Security Bypass

Affected products: WordPress MailUp Plugin 1.x

Affected versions: WordPress MailUp 1.3.2, perhaps the only one.

Description:

Which can be exploited by malicious people to bypass certain security restrictions.

The vulnerability is caused due to the application improperly restrict access to certain functions in the script wp-content/plugins/wp-mailup/ajax.functions.php (when cookies “wordpress_logged_in_test” set.) This can be exploited to bypass security restrictions and manipulate specific application settings.

Manufacturer URL: http://wordpress.org/extend/plugins/wp-mailup/

Solution: The way to eliminate the vulnerability does not exist at present.

Vulnerability: Cross-site scripting WordPress podPress

Danger level: Low
Availability of fixes: Insturktsii to eliminate
Number of vulnerabilities: 1

Vector of operation: Remote
Impact: Cross Site Scripting

Affected products: WordPress podPress Plugin 8.x

Affected versions: WordPress podPress 8.8.10.13, possibly earlier.

Description:

The vulnerability allows malicious people to conduct XSS attacks.

The vulnerability is caused due to insufficient input validation in the parameter “playerID” in script wp-content/plugins/podpress/players/1pixelout/1pixelout_player.swf. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.

Manufacturer URL: http://wordpress.org/extend/plugins/podpress/

Solution: Install the latest version from the SVN repository.

Links:
http://wordpress.org/extend/plugins/podpress/changelog/

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s