CVE-2014-4030CVE-2014-4030

Affected configuration(s):

cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.0.0::~~~wordpress~~
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.0.1::~~~wordpress~~
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.0.2::~~~wordpress~~
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.0.3::~~~wordpress~~
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.0.4::~~~wordpress~~
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.0.5::~~~wordpress~~
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.1.0::~~~wordpress~~
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.1.1::~~~wordpress~~
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.1.2::~~~wordpress~~
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.1.3::~~~wordpress~~

Date published: 2014-06-25T16:55:07.067-04:00

Date last modified: 2014-06-26T10:25:38.950-04:00

CVSS Score: 6.8

Principal attack vector: NETWORK

Complexity:  MEDIUM

Reference URL: http://seclists.org/fulldisclosure/2014/Jun/64

Summary: Cross-site request forgery (CSRF) vulnerability in the JW Player plugin before 2.1.4 for WordPress allows remote attackers to hijack the authentication of administrators for requests that remove players via a delete action to wp-admin/admin.php.

CategoriesUncategorised

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.