Cross-site scripting (XSS) vulnerability in flash/FlashMediaElement.as in MediaElement.js before 2.21.0, as used in WordPress before 4.5.2, allows remote attackers to inject arbitrary web script or HTML via an obfuscated form of the jsinitfunction parameter, as demonstrated by "jsinitfunctio%gn."
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://github.com/johndyer/mediaelement/blob/master/changelog.md | patch vendor advisory |
http://www.openwall.com/lists/oss-security/2016/05/07/2 | mailing list |
https://codex.wordpress.org/Version_4.5.2 | patch vendor advisory |
http://www.securitytracker.com/id/1035818 | vdb entry third party advisory |
https://gist.github.com/cure53/df34ea68c26441f3ae98f821ba1feb9c | third party advisory |
https://github.com/johndyer/mediaelement/commit/34834eef8ac830b9145df169ec22016a4350f06e | patch vendor advisory |
https://wpvulndb.com/vulnerabilities/8488 | third party advisory |
https://wordpress.org/news/2016/05/wordpress-4-5-2/ | patch vendor advisory |
https://core.trac.wordpress.org/changeset/37371 | patch |