Cross-site scripting (XSS) vulnerability in swfupload.swf in SWFUpload 2.2.0.1 and earlier, as used in WordPress before 3.3.2, TinyMCE Image Manager 1.1, and other products, allows remote attackers to inject arbitrary web script or HTML via the movieName parameter, related to the "ExternalInterface.call" function.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://bot24.blogspot.ca/2013/04/swfupload-object-injectioncsrf.html - Exploit | |
References | () http://code.google.com/p/swfupload/issues/detail?id=376 - | |
References | () http://make.wordpress.org/core/2013/06/21/secure-swfupload/ - Vendor Advisory | |
References | () http://packetstormsecurity.com/files/122399/TinyMCE-Image-Manager-1.1-Cross-Site-Scripting.html - Exploit | |
References | () http://www.openwall.com/lists/oss-security/2012/07/16/4 - | |
References | () http://www.openwall.com/lists/oss-security/2012/07/17/12 - | |
References | () http://www.securityfocus.com/bid/54245 - | |
References | () https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/ - Exploit |
Information
Published : 2013-07-19 14:36
Updated : 2024-11-21 01:40
NVD link : CVE-2012-3414
Mitre link : CVE-2012-3414
CVE.ORG link : CVE-2012-3414
JSON object : View
Products Affected
wordpress
- wordpress
swfupload_project
- swfupload
tinymce
- image_manager
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')