Multiple vulnerabilities in WordPress Cloudsafe365

Posted: September 3, 2012 in Vulnerabilities
Tags: , , ,

Wordpress VulnerabilityAffected products: WordPress Cloudsafe365 Plugin 1.x

Affected versions: WordPress Cloudsafe365 1.46, possibly earlier.

Description:

The vulnerability allows malicious people to conduct XSS attacks.

1. The vulnerability is caused due to insufficient input validation in the parameters of “file”, “line” and “malware” in the script wp-content/plugins/cloudsafe365-for-wp/admin/editor/cs365_edit.php. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.

2. The vulnerability is caused due to insufficient input validation in the parameter “file” in the script wp-content/plugins/cloudsafe365-for-wp/admin/editor/cs365_edit.php. This can be exploited via a specially crafted request containing directory traversal attacks, view the contents of arbitrary files on the system.

Solution: Update to version 1.47 from the manufacturer.

links:

http://wordpress.org/extend/plugins/cloudsafe365-for-wp/changelog/
http://archives.neohapsis.com/archives/fulldisclosure/current/0327.html

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s