NVD Vulnerability Detail
Search Exploit, PoC
CVE-2013-3720
Summary

Cross-site scripting (XSS) vulnerability in widget_remove.php in the Feedweb plugin before 1.9 for WordPress allows remote authenticated administrators to inject arbitrary web script or HTML via the wp_post_id parameter.

Publication Date May 31, 2013, 9:20 p.m.
Registration Date Jan. 26, 2021, 3:41 p.m.
Last Update Nov. 21, 2024, 10:54 a.m.
CVSS2.0 : LOW
Score 3.5
Vector AV:N/AC:M/Au:S/C:N/I:P/A:N
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 単一
機密性への影響(C) なし
完全性への影響(I)
可用性への影響(A) なし
Get all privileges. いいえ
Get user privileges いいえ
Get other privileges いいえ
User operation required はい
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:feedweb:feedweb:*:*:*:*:*:*:*:* 1.8.8
cpe:2.3:a:feedweb:feedweb:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.1.7:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.1.9:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.2:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.2.11:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.2.12:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.3:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.3.1:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.3.2:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.3.5:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.3.6:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.3.7:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.3.8:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.3.9:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.3.10:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.3.11:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.3.12:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.3.13:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.3.14:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.3.15:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.4:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.4.1:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.4.2:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.4.3:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.4.4:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.4.5:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.4.6:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.4.7:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.5:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.5.3:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.5.4:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.5.5:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.5.6:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.5.7:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.5.8:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.5.9:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.5.10:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.5.11:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.5.12:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.6:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.6.1:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.6.2:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.6.3:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.7:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.7.1:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.7.2:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.7.3:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.7.4:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.7.5:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.8:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.8.1:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.8.2:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.8.3:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.8.4:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.8.5:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.8.6:*:*:*:*:*:*:*
cpe:2.3:a:feedweb:feedweb:1.8.7:*:*:*:*:*:*:*
execution environment
1 cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
WordPress 用 Feedweb プラグインにおけるクロスサイトスクリプティングの脆弱性
Title WordPress 用 Feedweb プラグインにおけるクロスサイトスクリプティングの脆弱性
Summary

WordPress 用 Feedweb プラグインの widget_remove.php には、クロスサイトスクリプティングの脆弱性が存在します。

Possible impacts リモート認証された管理者により、wp_post_id パラメータを介して、任意の Web スクリプトまたは HTML を挿入される可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date March 31, 2013, midnight
Registration Date June 3, 2013, 11:26 a.m.
Last Update June 3, 2013, 11:26 a.m.
Affected System
Feedweb Research
Feedweb 1.9 未満
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
0 [2013年06月03日]
  掲載
Feb. 17, 2018, 10:37 a.m.