Affected products: WordPress Cloudsafe365 Plugin 1.x
Affected versions: WordPress Cloudsafe365 1.46, possibly earlier.
Description:
The vulnerability allows malicious people to conduct XSS attacks.
1. The vulnerability is caused due to insufficient input validation in the parameters of “file”, “line” and “malware” in the script wp-content/plugins/cloudsafe365-for-wp/admin/editor/cs365_edit.php. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.
2. The vulnerability is caused due to insufficient input validation in the parameter “file” in the script wp-content/plugins/cloudsafe365-for-wp/admin/editor/cs365_edit.php. This can be exploited via a specially crafted request containing directory traversal attacks, view the contents of arbitrary files on the system.
Solution: Update to version 1.47 from the manufacturer.
links:
http://wordpress.org/extend/plugins/cloudsafe365-for-wp/changelog/
http://archives.neohapsis.com/archives/fulldisclosure/current/0327.html