Recent PostsWordPress

WordPress 4.2 and earlier vulnerable issues found !

WordPress 4.2 and earlier vulnerable issues found !

The vulnerability allows an attacker to inject JavaScript in the WordPress comment field; the comment has to be at least 66,000 characters long and it will be triggered when the comment is viewed.
Date:- April 27th, 2015.

“An unauthenticated attacker can store JavaScript on WordPress pages and blog posts. If triggered by an administrator, this leads to server-side code execution under default settings,”.
“A usable comment form is required. It looks like the script is not executed in the admin Dashboard, but only when viewing the post/page where the comment was entered. If comment moderation is enabled (the default setting) then the comment won’t appear on the page until it has been approved by an admin/moderator. Under default settings, after one ‘harmless’ comment is approved, the attacker is free from subsequent moderation and can inject the exploit to several pages and blog posts.”
“Best solution until a patch is made available is to disable comments and not approve any”.

More Information:-http://klikki.fi/adv/wordpress2.html
Source from:-https://threatpost.com/details-on-wordpress-zero-day-disclosed/112435

What's your reaction?

Excited
0
Happy
0
In Love
0
Not Sure
0
Silly
0

Comments are closed.

Next Article:

0 %