Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 1 Mar 2017 07:17:14 +0100
From: Summer of Pwnage <lists@...urify.nl>
To: oss-security@...ts.openwall.com
Subject: Multiple Cross-Site Request Forgery vulnerabilities affecting various
 WordPress Plugins

Please see attached advisories for more information. These issues were 
found during Summer of Pwnage (https://sumofpwn.nl), a Dutch community 
project. Its goal is to contribute to the security of popular, widely 
used OSS projects in a fun and educational way.



View attachment "cross_site_request_forgery_in_atahualpa_wordpress_theme.txt" of type "text/plain" (4875 bytes)

View attachment "cross_site_request_forgery_in_file_manager_wordpress_plugin.txt" of type "text/plain" (3812 bytes)

View attachment "cross_site_request_forgery_in_global_content_blocks_wordpress_plugin.txt" of type "text/plain" (4080 bytes)

View attachment "cross_site_request_forgery_in_wordpress_download_manager_plugin.txt" of type "text/plain" (4933 bytes)

View attachment "gwolle_guestbook_mass_action_vulnerable_for_cross_site_request_forgery.txt" of type "text/plain" (4195 bytes)

View attachment "popup_by_supsystic_wordpress_plugin_vulnerable_to_cross_site_request_forgery.txt" of type "text/plain" (14673 bytes)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ