Multiple cross-site scripting (XSS) vulnerabilities in pages/3DComplete.php in the WooCommerce SagePay Direct Payment Gateway plugin before 0.1.6.7 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) MD or (2) PARes parameter.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:10
Type | Values Removed | Values Added |
---|---|---|
References | () http://codevigilant.com/disclosure/wp-plugin-sagepay-direct-for-woocommerce-payment-gateway-a3-cross-site-scripting-xss - Exploit | |
References | () http://wordpress.org/plugins/sagepay-direct-for-woocommerce-payment-gateway/changelog - Patch | |
References | () http://www.securityfocus.com/bid/65355 - Exploit | |
References | () https://github.com/wp-plugins/sagepay-direct-for-woocommerce-payment-gateway/commit/9c6cf939c6c25377c285439b92ef2bb5ebda9db6 - |
Information
Published : 2014-07-02 20:55
Updated : 2024-11-21 02:10
NVD link : CVE-2014-4549
Mitre link : CVE-2014-4549
CVE.ORG link : CVE-2014-4549
JSON object : View
Products Affected
woocommerce_sagepay_direct_payment_gateway_project
- woocommerce_sagepay_direct_payment_gateway
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')