CVE漏洞中文网

0DayBank一个专门收集整理全球互联网漏洞的公开发布网站
  1. 首页
  2. CVE
  3. 正文

CVE-2017-15867 WordPress User Login History Plugin Multiple Cross-Site Scripting Vulnerabilities

2017年11月20日 1160点热度 0人点赞 0条评论

漏洞类别:CGI

漏洞等级:

漏洞信息

WordPress is an open source blogging tool and content management system based on PHP and MySQL. It has many features including a plug-in architecture and a template system. User Login History easily tracks user login with the multiple attributes.

Multiple cross-site scripting (XSS) vulnerabilities in the allow remote attackers to inject arbitrary web script or HTML via the date_from, date_to, user_id, username, country_name, browser, operating_system, or ip_address parameter to the admin/partials/listing/listing.php source file.

Affected Versions:
User Login History versions prior to 1.6

QID Detection Logic:
This unauthenticated detection depends on the BlindElephant engine to detect the version of the User Login History plugin in any WordPress installation as active attacks could potentially harm live installations.

漏洞危害

Successful exploitation allows a remote attacker to conduct XSS attacks against a targeted machine.

解决方案

Customers are advised to upgrade User Login History 1.6 or later WordPress plugin versions to remediate this vulnerability.

Patch:
Following are links for downloading patches to fix the vulnerabilities:

User Login History 1.6 or later

0daybank

标签: 暂无
最后更新:2017年12月8日

小助手

这个人很懒,什么都没留下

点赞
< 上一篇
下一篇 >

文章评论

您需要 登录 之后才可以评论

COPYRIGHT © 2024 www.pdr.cn CVE漏洞中文网. ALL RIGHTS RESERVED.

鲁ICP备2022031030号

联系邮箱:wpbgssyubnmsxxxkkk@proton.me