CVE-2013-2204

critical

Description

moxieplayer.as in Moxiecode moxieplayer, as used in the TinyMCE Media plugin in WordPress before 3.5.2 and other products, does not consider the presence of a # (pound sign) character during extraction of the QUERY_STRING, which allows remote attackers to pass arbitrary parameters to a Flash application, and conduct content-spoofing attacks, via a crafted string after a ? (question mark) character.

References

https://bugzilla.redhat.com/show_bug.cgi?id=976784

http://www.debian.org/security/2013/dsa-2718

http://wordpress.org/news/2013/06/wordpress-3-5-2/

http://codex.wordpress.org/Version_3.5.2

Details

Source: Mitre, NVD

Published: 2013-07-08

Updated: 2013-08-13

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical