Summary
This host is running WordPress multiple themes and is prone to cross site scripting vulnerabilities.
Impact
Successful exploitation will allow remote attackers to insert arbitrary HTML and script code, which will be executed in a user's browser session in the context of an affected site.
Impact Level: Application
Solution
Upgrade to latest version of the themes.
For updates refer to http://wordpress.org/extend/themes/
Insight
The flaws are due to improper validation of user-supplied input to the 's' Parameter in multiple themes, which allows attackers to execute arbitrary HTML and script code in a user's browser session in the context of an affected site.
Affected
Atahualpa theme before 3.6.8
EvoLve theme before 1.2.6
ZenLite theme before 4.4
Cover WP theme before 1.6.6
F8 Lite theme before 4.2.2
Elegant Grunge theme before 1.0.4
Antisnews theme before 1.10
Pixiv Custom theme before 2.1.6
RedLine theme before 1.66
References
- https://sitewat.ch/en/Advisories/8
- https://sitewat.ch/en/Advisories/10
- https://sitewat.ch/en/Advisories/12
- https://sitewat.ch/en/Advisories/13
- https://sitewat.ch/en/Advisories/14
- https://sitewat.ch/en/Advisories/15
- https://sitewat.ch/en/Advisories/16
- https://sitewat.ch/en/Advisories/18
- https://sitewat.ch/en/Advisories/22
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2011-3850, CVE-2011-3852, CVE-2011-3854, CVE-2011-3855, CVE-2011-3856, CVE-2011-3857, CVE-2011-3858, CVE-2011-3860, CVE-2011-3863 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Apache Struts CookBook/Examples Multiple Cross-Site Scripting Vulnerabilities
- APC PowerChute Network Shutdown HTTP Response Splitting Vulnerability
- Apache Struts2 'XWork' Information Disclosure Vulnerability
- Apache Tomcat 'sendfile' Request Attributes Information Disclosure Vulnerability
- Allaire JRun directory browsing vulnerability