Name | CVE-2016-4567 |
Description | Cross-site scripting (XSS) vulnerability in flash/FlashMediaElement.as in MediaElement.js before 2.21.0, as used in WordPress before 4.5.2, allows remote attackers to inject arbitrary web script or HTML via an obfuscated form of the jsinitfunction parameter, as demonstrated by "jsinitfunctio%gn." |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 823649 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
mediaelement (PTS) | sid, trixie, bookworm, bullseye | 2.15.1+dfsg-3 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
mediaelement | source | (unstable) | (unfixed) | unimportant | | 823649 |
Notes
https://core.trac.wordpress.org/changeset/37370
Fixed by: https://github.com/johndyer/mediaelement/commit/34834eef8ac830b9145df169ec22016a4350f06e
Vulnerable code present, but Flash Player disabled in Debian
See 0004-Deactivate-Flash-and-Silverlight.patch
https://www.openwall.com/lists/oss-security/2016/05/07/2