Cross-site scripting in Debian Linux and WordPress - CVE-2015-3439
Published: August 5, 2015 / Updated: August 9, 2020
WordPress.ORG
Debian Linux
WordPress
Detailed vulnerability description
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in the Ephox (formerly Moxiecode) plupload.flash.swf shim 2.1.2 in Plupload, as used in WordPress 3.9.x, 4.0.x, and 4.1.x before 4.1.2 and other products, when processing target parameter, as demonstrated by executing a certain click function, related to _init.as and _fireEvent.as. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
How to mitigate CVE-2015-3439
Sources
- http://codex.wordpress.org/Version_4.1.2
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157391.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158271.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158278.html
- http://www.debian.org/security/2015/dsa-3250
- http://www.securityfocus.com/bid/74269
- http://www.securitytracker.com/id/1032207
- http://zoczus.blogspot.com/2015/04/plupload-same-origin-method-execution.html
- https://core.trac.wordpress.org/changeset/32168
- https://wordpress.org/news/2015/04/wordpress-4-1-2/
- https://wpvulndb.com/vulnerabilities/7933