Vulnerability CVE-2013-2204


Published: 2013-07-08   Modified: 2013-07-09

Description:
moxieplayer.as in Moxiecode moxieplayer, as used in the TinyMCE Media plugin in WordPress before 3.5.2 and other products, does not consider the presence of a # (pound sign) character during extraction of the QUERY_STRING, which allows remote attackers to pass arbitrary parameters to a Flash application, and conduct content-spoofing attacks, via a crafted string after a ? (question mark) character.

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Wordpress -> Wordpress 
W2000ordpress -> Wordpress 
Tinymce -> Media 

 References:
https://github.com/moxiecode/moxieplayer/commit/b61ac518ffa2657e2dc9019b2dcf2f3f37dbfab0
https://bugzilla.redhat.com/show_bug.cgi?id=976784
http://wordpress.org/news/2013/06/wordpress-3-5-2/
http://codex.wordpress.org/Version_3.5.2

Copyright 2024, cxsecurity.com

 

Back to Top