Vigil@nce - WordPress Revslider: three vulnerabilities
August 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use several vulnerabilities of WordPress Revslider.
Impacted products: WordPress Plugins not comprehensive.
Severity: 2/4.
Creation date: 19/06/2015.
DESCRIPTION OF THE VULNERABILITY
Several vulnerabilities were announced in WordPress Revslider.
An attacker can trigger a Cross Site Scripting via the parameter
"client_action", in order to execute JavaScript code in the
context of the web site. [severity:2/4; CVE-2015-5151]
An attacker can bypass security features of administration pages,
in order to obtain sensitive information. [severity:1/4]
An attacker can traverse directories with the path specified in
the "img" parameter, in order to read a file outside the root
path. [severity:2/4]
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/WordPress-Revslider-three-vulnerabilities-17177