First published: Sat Apr 21 2012(Updated: )
Plupload before 1.5.4, as used in wp-includes/js/plupload/ in WordPress before 3.3.2 and other products, enables scripting regardless of the domain from which the SWF content was loaded, which allows remote attackers to bypass the Same Origin Policy via crafted content.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Moxiecode plupload | <=1.5.3 | |
Moxiecode plupload | =1.4.0 | |
Moxiecode plupload | =1.4.1 | |
Moxiecode plupload | =1.4.2 | |
Moxiecode plupload | =1.4.3 | |
Moxiecode plupload | =1.5.0 | |
Moxiecode plupload | =1.5.0-beta | |
Moxiecode plupload | =1.5.1 | |
Moxiecode plupload | =1.5.2 | |
WordPress | <=3.3.1 | |
WordPress | =0.71 | |
WordPress | =1.0 | |
WordPress | =1.0.1 | |
WordPress | =1.0.2 | |
WordPress | =1.1.1 | |
WordPress | =1.2 | |
WordPress | =1.2.1 | |
WordPress | =1.2.2 | |
WordPress | =1.2.3 | |
WordPress | =1.2.4 | |
WordPress | =1.2.5 | |
WordPress | =1.2.5-a | |
WordPress | =1.3 | |
WordPress | =1.3.2 | |
WordPress | =1.3.3 | |
WordPress | =1.5 | |
WordPress | =1.5.1 | |
WordPress | =1.5.1.1 | |
WordPress | =1.5.1.2 | |
WordPress | =1.5.1.3 | |
WordPress | =1.5.2 | |
WordPress | =2.0 | |
WordPress | =2.0.1 | |
WordPress | =2.0.2 | |
WordPress | =2.0.4 | |
WordPress | =2.0.5 | |
WordPress | =2.0.6 | |
WordPress | =2.0.7 | |
WordPress | =2.0.8 | |
WordPress | =2.0.9 | |
WordPress | =2.0.10 | |
WordPress | =2.0.11 | |
WordPress | =2.1 | |
WordPress | =2.1.1 | |
WordPress | =2.1.2 | |
WordPress | =2.1.3 | |
WordPress | =2.2 | |
WordPress | =2.2.1 | |
WordPress | =2.2.2 | |
WordPress | =2.2.3 | |
WordPress | =2.3 | |
WordPress | =2.3.1 | |
WordPress | =2.3.2 | |
WordPress | =2.3.3 | |
WordPress | =2.5 | |
WordPress | =2.5.1 | |
WordPress | =2.6 | |
WordPress | =2.6.1 | |
WordPress | =2.6.2 | |
WordPress | =2.6.3 | |
WordPress | =2.6.5 | |
WordPress | =2.7 | |
WordPress | =2.7.1 | |
WordPress | =2.8 | |
WordPress | =2.8.1 | |
WordPress | =2.8.2 | |
WordPress | =2.8.3 | |
WordPress | =2.8.4 | |
WordPress | =2.8.4-a | |
WordPress | =2.8.5 | |
WordPress | =2.8.5.1 | |
WordPress | =2.8.5.2 | |
WordPress | =2.8.6 | |
WordPress | =2.9 | |
WordPress | =2.9.1 | |
WordPress | =2.9.1.1 | |
WordPress | =2.9.2 | |
WordPress | =3.0 | |
WordPress | =3.0.1 | |
WordPress | =3.0.2 | |
WordPress | =3.0.3 | |
WordPress | =3.0.4 | |
WordPress | =3.0.5 | |
WordPress | =3.0.6 | |
WordPress | =3.1 | |
WordPress | =3.1.1 | |
WordPress | =3.1.2 | |
WordPress | =3.1.3 | |
WordPress | =3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2401 has been classified as a medium severity vulnerability due to its potential impact on the Same Origin Policy.
To fix CVE-2012-2401, update Plupload to version 1.5.4 or later, or use WordPress version 3.3.2 or later.
CVE-2012-2401 affects all versions of Plupload before 1.5.4 and WordPress versions prior to 3.3.2.
CVE-2012-2401 allows remote attackers to bypass the Same Origin Policy through crafted SWF content.
CVE-2012-2401 is not a concern for current WordPress installations if they are updated to the latest versions.