Summary
This host is installed with Wordpress VideoWhisper Live Streaming Integration Plugin and is prone to multiple vulnerabilities.
Impact
Successful exploitation will allow attacker to execute arbitrary HTML and script code in a user's browser session in the context of an affected site and read/delete arbitrary files.
Impact Level: Application
Solution
Upgrade to version 4.29.5 or later,
For updates refer to http://wordpress.org/plugins/videowhisper-live-streaming-integration
Insight
Multiple flaws are due to an,
- Improper verification of file extensions before uploading files to the server in '/videowhisper-live-streaming-integration/ls/vw_snapshots.php' - Input passed via HTTP POST parameters 'msg' to /ls/vc_chatlog.php, 'm' to /ls/lb_status.php, 'ct' to /ls/lb_status.php and /ls/v_status.php.
- Input passed via HTTP GET parameters 'n' to /ls/channel.php, htmlchat.php, ls/video.php, and /videotext.php, 'message' to /ls/lb_logout.php, and 's' to rtmp_login.php and rtmp_logout.php scripts.
Affected
WordPress VideoWhisper Live Streaming Integration Plugin version 4.27.3 and probably prior.
Detection
Send a crafted data via HTTP GET request and check whether it is able to read cookie or not.
References
Severity
Classification
-
CVE CVE-2014-1905, CVE-2014-1906, CVE-2014-1907, CVE-2014-1908 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Apache Struts2 'URL' & 'Anchor' tags Arbitrary Java Method Execution Vulnerabilities
- Apache Solr XML External Entity(XXE) Vulnerability-02 Jan-14
- Artifectx xClassified 'catid' SQL Injection Vulnerability
- Adobe ColdFusion Information Disclosure Vulnerability
- Athena Web Registration remote command execution flaw