The tweet_info function in class/__functions.php in the SecureMoz Security Audit plugin 1.0.5 and earlier for WordPress does not use an HTTPS session for downloading serialized data, which allows man-in-the-middle attackers to conduct PHP object injection attacks and execute arbitrary PHP code by modifying the client-server data stream. NOTE: some of these details are obtained from third party information.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.openwall.com/lists/oss-security/2015/09/06/3 | mailing list exploit third party advisory |
http://www.openwall.com/lists/oss-security/2015/09/05/4 | mailing list exploit third party advisory |
https://wpvulndb.com/vulnerabilities/8179 | third party advisory |