Affected configuration(s):
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.0.0::~~~wordpress~~
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.0.1::~~~wordpress~~
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.0.2::~~~wordpress~~
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.0.3::~~~wordpress~~
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.0.4::~~~wordpress~~
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.0.5::~~~wordpress~~
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.1.0::~~~wordpress~~
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.1.1::~~~wordpress~~
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.1.2::~~~wordpress~~
cpe:/a:longtailvideo:jw_player_for_flash_%26_html5_video_plugin:2.1.3::~~~wordpress~~
Date published: 2014-06-25T16:55:07.067-04:00
Date last modified: 2014-06-26T10:25:38.950-04:00
CVSS Score: 6.8
Principal attack vector: NETWORK
Complexity: MEDIUM
Reference URL: http://seclists.org/fulldisclosure/2014/Jun/64
Summary: Cross-site request forgery (CSRF) vulnerability in the JW Player plugin before 2.1.4 for WordPress allows remote attackers to hijack the authentication of administrators for requests that remove players via a delete action to wp-admin/admin.php.