漏洞信息详情
WordPress social-warfare插件跨站脚本漏洞
漏洞简介
WordPress是WordPress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。social-warfare plugin是使用在其中的一个社交平台分享插件。
WordPress social-warfare插件3.5.3之前版本中存在跨站脚本漏洞。远程攻击者可借助‘swp_url’参数利用该漏洞注入恶意的JavaScript脚本。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://wordpress.org/plugins/social-warfare/#developers
参考网址
来源:www.wordfence.com
链接:https://www.wordfence.com/blog/2019/03/unpatched-zero-day-vulnerability-in-social-warfare-plugin-exploited-in-the-wild/
来源:www.pluginvulnerabilities.com
链接:https://www.pluginvulnerabilities.com/2019/03/21/full-disclosure-of-settings-change-persistent-cross-site-scripting-xss-vulnerability-in-social-warfare/
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2019032105
来源:wordpress.org
链接:https://wordpress.org/plugins/social-warfare/#developers
来源:twitter.com
链接:https://twitter.com/warfareplugins/status/1108852747099652099
来源:blog.sucuri.net
链接:https://blog.sucuri.net/2019/03/zero-day-stored-xss-in-social-warfare.html
来源:EXPLOIT-DB
链接:https://www.exploit-db.com/exploits/46794/
来源:MISC
链接:http://packetstormsecurity.com/files/152722/Wordpress-Social-Warfare-Remote-Code-Execution.html
来源:MISC
链接:https://wpvulndb.com/vulnerabilities/9238
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/163680/WordPress-Social-Warfare-3.5.2-Remote-Code-Execution.html
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/43038
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/152722/Wordpress-Social-Warfare-Remote-Code-Execution.html
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/WordPress-Social-Warfare-Cross-Site-Scripting-28845
来源:www.exploit-db.com
链接:https://www.exploit-db.com/exploits/46794
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-9978
受影响实体
暂无
补丁
- WordPress social-warfare插件跨站脚本漏洞的修复措施<!--2019-3-24-->
还没有评论,来说两句吧...