Summary
This host is running WordPress multiple themes and is prone to cross site scripting vulnerabilities.
Impact
Successful exploitation will allow remote attackers to insert arbitrary HTML and script code, which will be executed in a user's browser session in the context of an affected site.
Impact Level: Application
Solution
Upgrade to latest version of the themes.
For updates refer to http://wordpress.org/extend/themes/
Insight
The flaws are due to improper validation of user-supplied input to the 's' Parameter in multiple themes, which allows attackers to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.
Affected
Atahualpa theme before 3.6.8
EvoLve theme before 1.2.6
ZenLite theme before 4.4
Cover WP theme before 1.6.6
F8 Lite theme before 4.2.2
Elegant Grunge theme before 1.0.4
Antisnews theme before 1.10
Pixiv Custom theme before 2.1.6
RedLine theme before 1.66
References
- https://sitewat.ch/en/Advisories/8
- https://sitewat.ch/en/Advisories/10
- https://sitewat.ch/en/Advisories/12
- https://sitewat.ch/en/Advisories/13
- https://sitewat.ch/en/Advisories/14
- https://sitewat.ch/en/Advisories/15
- https://sitewat.ch/en/Advisories/16
- https://sitewat.ch/en/Advisories/18
- https://sitewat.ch/en/Advisories/22
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2011-3850, CVE-2011-3852, CVE-2011-3854, CVE-2011-3855, CVE-2011-3856, CVE-2011-3857, CVE-2011-3858, CVE-2011-3860, CVE-2011-3863 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- AeroMail Cross Site Request Forgery, HTML Injection and Cross Site Scripting Vulnerabilities
- Apache Continuum Cross Site Scripting Vulnerability
- Apache Tomcat NIO Connector Denial of Service Vulnerability
- Apache Web Server ETag Header Information Disclosure Weakness
- Adobe BlazeDS XML and XML External Entity Injection Vulnerabilities