CWE
79 918 264
Advisory Published
CVE Published
Updated

CVE-2013-2199: XSS

First published: Fri Jun 21 2013(Updated: )

On Friday, 2013-06-21 WordPress upstream is about to release new WordPress v3.5.2 version, correcting the following security flaws: * <a href="https://access.redhat.com/security/cve/CVE-2013-2199">CVE-2013-2199</a> - SSRF, multiple vulnerabilities: Inadequate SSRF protection for HTTP requests where the user can provide a URL can allow for attacks against the intranet and other sites. This is a continuation of work related to <a href="https://access.redhat.com/security/cve/CVE-2013-0235">CVE-2013-0235</a>, which was specific to SSRF in pingback requests and was fixed in 3.5.1. * <a href="https://access.redhat.com/security/cve/CVE-2013-2200">CVE-2013-2200</a> - Privilege escalation allowing contributors to publish posts: Inadequate checking of a user's capabilities could allow them to publish posts when their user role should not allow for it; and to assign posts to other authors. * <a href="https://access.redhat.com/security/cve/CVE-2013-2201">CVE-2013-2201</a> - XSS, multiple vulnerabilities: Inadequate escaping allowed an administrator to trigger a cross-site scripting vulnerability through the uploading of media files and plugins. * <a href="https://access.redhat.com/security/cve/CVE-2013-2202">CVE-2013-2202</a> - XXE via oEmbed: The processing of an oEmbed response is vulnerable to an XXE. * <a href="https://access.redhat.com/security/cve/CVE-2013-2203">CVE-2013-2203</a> - Full Path Disclosure during File Upload: If the uploads directory is not writable, error message data returned via XHR will include a full path to the directory. And two security flaws in external products: * <a href="https://access.redhat.com/security/cve/CVE-2013-2204">CVE-2013-2204</a> - Content Spoofing in the MoxieCode (TinyMCE) MoxiePlayer project: Upstream patch: <a href="https://github.com/moxiecode/moxieplayer/commit/b61ac518ffa2657e2dc9019b2">https://github.com/moxiecode/moxieplayer/commit/b61ac518ffa2657e2dc9019b2</a> * <a href="https://access.redhat.com/security/cve/CVE-2013-2205">CVE-2013-2205</a> - Cross-domain XSS in SWFUpload (again): Fix: Removing security.allowDomain("*") and only allow access from the same domain.

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
redhat/WordPress<3.5.2
3.5.2
WordPress WordPress<=3.5.1
WordPress WordPress=0.71
WordPress WordPress=1.0
WordPress WordPress=1.0.1
WordPress WordPress=1.0.2
WordPress WordPress=1.1.1
WordPress WordPress=1.2
WordPress WordPress=1.2.1
WordPress WordPress=1.2.2
WordPress WordPress=1.2.3
WordPress WordPress=1.2.4
WordPress WordPress=1.2.5
WordPress WordPress=1.2.5-a
WordPress WordPress=1.3
WordPress WordPress=1.3.2
WordPress WordPress=1.3.3
WordPress WordPress=1.5
WordPress WordPress=1.5.1
WordPress WordPress=1.5.1.1
WordPress WordPress=1.5.1.2
WordPress WordPress=1.5.1.3
WordPress WordPress=1.5.2
WordPress WordPress=1.6.2
WordPress WordPress=2.0
WordPress WordPress=2.0.1
WordPress WordPress=2.0.2
WordPress WordPress=2.0.4
WordPress WordPress=2.0.5
WordPress WordPress=2.0.6
WordPress WordPress=2.0.7
WordPress WordPress=2.0.8
WordPress WordPress=2.0.9
WordPress WordPress=2.0.10
WordPress WordPress=2.0.11
WordPress WordPress=2.1
WordPress WordPress=2.1.1
WordPress WordPress=2.1.2
WordPress WordPress=2.1.3
WordPress WordPress=2.2
WordPress WordPress=2.2.1
WordPress WordPress=2.2.2
WordPress WordPress=2.2.3
WordPress WordPress=2.3
WordPress WordPress=2.3.1
WordPress WordPress=2.3.2
WordPress WordPress=2.3.3
WordPress WordPress=2.5
WordPress WordPress=2.5.1
WordPress WordPress=2.6
WordPress WordPress=2.6.1
WordPress WordPress=2.6.2
WordPress WordPress=2.6.3
WordPress WordPress=2.6.5
WordPress WordPress=2.7
WordPress WordPress=2.7.1
WordPress WordPress=2.8
WordPress WordPress=2.8.1
WordPress WordPress=2.8.2
WordPress WordPress=2.8.3
WordPress WordPress=2.8.4
WordPress WordPress=2.8.4-a
WordPress WordPress=2.8.5
WordPress WordPress=2.8.5.1
WordPress WordPress=2.8.5.2
WordPress WordPress=2.8.6
WordPress WordPress=2.9
WordPress WordPress=2.9.1
WordPress WordPress=2.9.1.1
WordPress WordPress=2.9.2
WordPress WordPress=3.3
WordPress WordPress=3.3.1
WordPress WordPress=3.3.2
WordPress WordPress=3.3.3
WordPress WordPress=3.4.0
WordPress WordPress=3.4.1
WordPress WordPress=3.4.2
WordPress WordPress=3.5.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203