Cross-site scripting (XSS) vulnerability in flash/FlashMediaElement.as in MediaElement.js before 2.21.0, as used in WordPress before 4.5.2, allows remote attackers to inject arbitrary web script or HTML via an obfuscated form of the jsinitfunction parameter, as demonstrated by "jsinitfunctio%gn."
References
Link | Resource |
---|---|
https://wordpress.org/news/2016/05/wordpress-4-5-2/ | Patch Vendor Advisory |
http://www.openwall.com/lists/oss-security/2016/05/07/2 | |
https://codex.wordpress.org/Version_4.5.2 | Patch Vendor Advisory |
https://core.trac.wordpress.org/changeset/37371 | Patch |
https://github.com/johndyer/mediaelement/commit/34834eef8ac830b9145df169ec22016a4350f06e | Patch Vendor Advisory |
https://github.com/johndyer/mediaelement/blob/master/changelog.md | Patch Vendor Advisory |
https://wpvulndb.com/vulnerabilities/8488 | Third Party Advisory |
https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c | Third Party Advisory |
http://www.securitytracker.com/id/1035818 | Third Party Advisory VDB Entry |
Information
Published : 2016-05-21 18:59
Updated : 2016-12-02 15:01
NVD link : CVE-2016-4567
Mitre link : CVE-2016-4567
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
mediaelementjs
- mediaelement.js
wordpress
- wordpress