Cross-site scripting in Debian Linux - CVE-2015-3429
Published: June 17, 2015 / Updated: August 9, 2020
Debian Linux
Detailed vulnerability description
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in example.html in Genericons before 3.3.1, as used in WordPress before 4.2.2,. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
How to mitigate CVE-2015-3429
Sources
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158271.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158278.html
- http://packetstormsecurity.com/files/131802/WordPress-Twenty-Fifteen-4.2.1-Cross-Site-Scripting.html
- http://seclists.org/fulldisclosure/2015/May/41
- http://www.debian.org/security/2015/dsa-3328
- http://www.securityfocus.com/archive/1/535486/100/1000/threaded
- http://www.securityfocus.com/bid/74534
- https://github.com/Automattic/Genericons/commit/798ac98579dd72dfdb11bdee3e7bebf01cffb1f7
- https://wordpress.org/news/2015/05/wordpress-4-2-2/
- https://wpvulndb.com/vulnerabilities/7965
- https://www.digitalocean.com/community/tutorials/how-to-protect-your-wordpress-site-from-the-genericons-example-html-xss-vulnerability
- https://www.netsparker.com/cve-2015-3429-dom-xss-vulnerability-in-twenty-fifteen-wordpress-theme/