Vigil@nce - WordPress: Cross Site Scripting of jPlayer
May 2013 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can trigger a Cross Site Scripting in jPlayer of
WordPress, in order to execute JavaScript code in the context of
the web site.
Impacted products: WordPress
Severity: 2/4
Creation date: 23/04/2013
Revision date: 25/04/2013
DESCRIPTION OF THE VULNERABILITY
The jPlayer.swf application is used by plugins MP3-jPlayer, Haiku
minimalist audio player, Background Music, Jammer and WP jPlayer.
It is also used by the Studiozen, Photocrati, Music, Imperial
Fairytale and Feather12 themes.
However, it does not filter received data before inserting them in
generated HTML documents.
An attacker can therefore trigger a Cross Site Scripting in
jPlayer of WordPress, in order to execute JavaScript code in the
context of the web site.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/WordPress-Cross-Site-Scripting-of-jPlayer-12704