Vulnerability Details : CVE-2013-2204
moxieplayer.as in Moxiecode moxieplayer, as used in the TinyMCE Media plugin in WordPress before 3.5.2 and other products, does not consider the presence of a # (pound sign) character during extraction of the QUERY_STRING, which allows remote attackers to pass arbitrary parameters to a Flash application, and conduct content-spoofing attacks, via a crafted string after a ? (question mark) character.
Vulnerability category: Input validation
Products affected by CVE-2013-2204
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:tinymce:media:-:*:*:*:*:*:*:*
Threat overview for CVE-2013-2204
Top countries where our scanners detected CVE-2013-2204
Top open port discovered on systems with this issue
80
IPs affected by CVE-2013-2204 34
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2013-2204!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2013-2204
1.08%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 84 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2013-2204
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:N/I:P/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2013-2204
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-2204
-
https://bugzilla.redhat.com/show_bug.cgi?id=976784
976784 – (CVE-2013-2199, CVE-2013-2200, CVE-2013-2201, CVE-2013-2202, CVE-2013-2203, CVE-2013-2204, CVE-2013-2205) CVE-2013-2199 CVE-2013-2200 CVE-2013-2201 CVE-2013-2202 CVE-2013-2203 CVE-2013-2204 C
-
http://codex.wordpress.org/Version_3.5.2
Version 3.5.2 | WordPress.org
-
https://github.com/moxiecode/moxieplayer/commit/b61ac518ffa2657e2dc9019b2dcf2f3f37dbfab0
Consider part of url after '?' as querystring, no matter what preceed… · moxiecode/moxieplayer@b61ac51 · GitHubExploit;Patch
-
http://wordpress.org/news/2013/06/wordpress-3-5-2/
News – WordPress 3.5.2 Maintenance and Security Release – WordPress.orgVendor Advisory
-
http://www.debian.org/security/2013/dsa-2718
Debian -- Security Information -- DSA-2718-1 wordpress
Jump to