Vulnerabilites related to tinymce - media
CVE-2013-2204 (GCVE-0-2013-2204)
Vulnerability from cvelistv5
Published
2013-07-08 20:00
Modified
2024-08-06 15:27
Severity ?
CWE
  • n/a
Summary
moxieplayer.as in Moxiecode moxieplayer, as used in the TinyMCE Media plugin in WordPress before 3.5.2 and other products, does not consider the presence of a # (pound sign) character during extraction of the QUERY_STRING, which allows remote attackers to pass arbitrary parameters to a Flash application, and conduct content-spoofing attacks, via a crafted string after a ? (question mark) character.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:27:41.131Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wordpress.org/news/2013/06/wordpress-3-5-2/"
          },
          {
            "name": "DSA-2718",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2718"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=976784"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://codex.wordpress.org/Version_3.5.2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/moxiecode/moxieplayer/commit/b61ac518ffa2657e2dc9019b2dcf2f3f37dbfab0"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-06-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "moxieplayer.as in Moxiecode moxieplayer, as used in the TinyMCE Media plugin in WordPress before 3.5.2 and other products, does not consider the presence of a # (pound sign) character during extraction of the QUERY_STRING, which allows remote attackers to pass arbitrary parameters to a Flash application, and conduct content-spoofing attacks, via a crafted string after a ? (question mark) character."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-08-13T09:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wordpress.org/news/2013/06/wordpress-3-5-2/"
        },
        {
          "name": "DSA-2718",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2718"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=976784"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://codex.wordpress.org/Version_3.5.2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/moxiecode/moxieplayer/commit/b61ac518ffa2657e2dc9019b2dcf2f3f37dbfab0"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-2204",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "moxieplayer.as in Moxiecode moxieplayer, as used in the TinyMCE Media plugin in WordPress before 3.5.2 and other products, does not consider the presence of a # (pound sign) character during extraction of the QUERY_STRING, which allows remote attackers to pass arbitrary parameters to a Flash application, and conduct content-spoofing attacks, via a crafted string after a ? (question mark) character."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://wordpress.org/news/2013/06/wordpress-3-5-2/",
              "refsource": "CONFIRM",
              "url": "http://wordpress.org/news/2013/06/wordpress-3-5-2/"
            },
            {
              "name": "DSA-2718",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2013/dsa-2718"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=976784",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=976784"
            },
            {
              "name": "http://codex.wordpress.org/Version_3.5.2",
              "refsource": "CONFIRM",
              "url": "http://codex.wordpress.org/Version_3.5.2"
            },
            {
              "name": "https://github.com/moxiecode/moxieplayer/commit/b61ac518ffa2657e2dc9019b2dcf2f3f37dbfab0",
              "refsource": "CONFIRM",
              "url": "https://github.com/moxiecode/moxieplayer/commit/b61ac518ffa2657e2dc9019b2dcf2f3f37dbfab0"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-2204",
    "datePublished": "2013-07-08T20:00:00",
    "dateReserved": "2013-02-19T00:00:00",
    "dateUpdated": "2024-08-06T15:27:41.131Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2013-07-08 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
moxieplayer.as in Moxiecode moxieplayer, as used in the TinyMCE Media plugin in WordPress before 3.5.2 and other products, does not consider the presence of a # (pound sign) character during extraction of the QUERY_STRING, which allows remote attackers to pass arbitrary parameters to a Flash application, and conduct content-spoofing attacks, via a crafted string after a ? (question mark) character.
Impacted products
Vendor Product Version
tinymce media -
wordpress wordpress *
wordpress wordpress 0.71
wordpress wordpress 1.0
wordpress wordpress 1.0.1
wordpress wordpress 1.0.2
wordpress wordpress 1.1.1
wordpress wordpress 1.2
wordpress wordpress 1.2.1
wordpress wordpress 1.2.2
wordpress wordpress 1.2.3
wordpress wordpress 1.2.4
wordpress wordpress 1.2.5
wordpress wordpress 1.2.5
wordpress wordpress 1.3
wordpress wordpress 1.3.2
wordpress wordpress 1.3.3
wordpress wordpress 1.5
wordpress wordpress 1.5.1
wordpress wordpress 1.5.1.1
wordpress wordpress 1.5.1.2
wordpress wordpress 1.5.1.3
wordpress wordpress 1.5.2
wordpress wordpress 1.6.2
wordpress wordpress 2.0
wordpress wordpress 2.0.1
wordpress wordpress 2.0.2
wordpress wordpress 2.0.4
wordpress wordpress 2.0.5
wordpress wordpress 2.0.6
wordpress wordpress 2.0.7
wordpress wordpress 2.0.8
wordpress wordpress 2.0.9
wordpress wordpress 2.0.10
wordpress wordpress 2.0.11
wordpress wordpress 2.1
wordpress wordpress 2.1.1
wordpress wordpress 2.1.2
wordpress wordpress 2.1.3
wordpress wordpress 2.2
wordpress wordpress 2.2.1
wordpress wordpress 2.2.2
wordpress wordpress 2.2.3
wordpress wordpress 2.3
wordpress wordpress 2.3.1
wordpress wordpress 2.3.2
wordpress wordpress 2.3.3
wordpress wordpress 2.5
wordpress wordpress 2.5.1
wordpress wordpress 2.6
wordpress wordpress 2.6.1
wordpress wordpress 2.6.2
wordpress wordpress 2.6.3
wordpress wordpress 2.6.5
wordpress wordpress 2.7
wordpress wordpress 2.7.1
wordpress wordpress 2.8
wordpress wordpress 2.8.1
wordpress wordpress 2.8.2
wordpress wordpress 2.8.3
wordpress wordpress 2.8.4
wordpress wordpress 2.8.4
wordpress wordpress 2.8.5
wordpress wordpress 2.8.5.1
wordpress wordpress 2.8.5.2
wordpress wordpress 2.8.6
wordpress wordpress 2.9
wordpress wordpress 2.9.1
wordpress wordpress 2.9.1.1
wordpress wordpress 2.9.2
wordpress wordpress 3.3
wordpress wordpress 3.3.1
wordpress wordpress 3.3.2
wordpress wordpress 3.3.3
wordpress wordpress 3.4.0
wordpress wordpress 3.4.1
wordpress wordpress 3.4.2
wordpress wordpress 3.5.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:tinymce:media:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C0A7C34-B1D0-4904-AB96-7644238623FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "220A44EF-6424-4E4F-A537-D35052D944FB",
              "versionEndIncluding": "3.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C8B90E9-5DF5-45F5-9810-2973FDAA16A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7D86BA1-3DC8-478C-B2FA-581F9AE1F93E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7BEFBD-4326-44A5-A160-9406D94AB307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E85A88D7-07A1-4A8C-88B5-057AD9C675E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8B664FF-DF43-45C3-A42D-1FCD42A597B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF1FE320-DF71-42EC-A0F0-300F7D6D4AB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B64D4777-2ED6-4A47-A8F3-38A3A8EB1ACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "614956CB-0582-4EAD-86F4-5AB0BB781CE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "59F19F56-9338-4917-B782-AA70BF1511EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B83B70AE-3C27-4AD0-869C-E219728A8D92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "62C3BA98-8CF0-4440-BE46-27FC0E20BC38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*",
              "matchCriteriaId": "0D437FE7-78EA-4264-BF16-1B5757AC6AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A53347E6-D721-4E47-BE5B-FA927B9DB164",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2C97B7C-77F4-4020-8574-E853CE5CD885",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B47496E3-BB07-45E6-ACCA-84D5EF499E21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "503E4894-3F39-471F-9A56-052718813BF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "38085E5A-7B41-4E43-8A22-5FD44970F3EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF628FB8-1AC4-4F15-9967-E60785A32D1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0BF1F6-A54A-48E8-A872-015FE10E5D03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F0B6EAC-E43D-4D1B-856F-7C23250A2355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "51FAD0FC-CE84-4332-B061-75C0C8A0B6AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AA51B49-8E36-48BC-A660-F155D6A4E166",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDCFE9AA-39E9-4366-AAB7-F7A891BC797E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAF4671A-8449-438E-922B-94E5542137BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "92F05A1F-2227-4166-807B-1BDE2EA8F245",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EECE66B3-3696-4E98-AF63-DF2FB256A6FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E75BB382-6B47-4C6A-BF94-80443BEB1A23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA75368-506F-4772-B0F2-8AAECDF288F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDD9E5C-766F-4945-B87D-781E780AB03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A48C0BB5-2D87-49ED-A8EB-843E5F0EAE8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6AAA17D-FBB8-4F54-82E2-870D6FA5C299",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A0CAEE-5C14-44C6-85FB-6AFDAAA1C3F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "66BE667A-A937-4C38-B4D5-29B33F23F7B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3624D4-E666-4A1B-B465-714ACBA0034C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7CBC45-320E-48CF-9A63-07DDE2FB61BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "266E32CD-66FB-4E19-8091-EC748B177D8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3DD9120-2224-4612-A6EE-539F47BD50E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A9FBA02-8A6A-471F-92CD-D8E77B5061C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B5BC7E8-4C8A-4183-AB8C-1DAE12935387",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0F9137B-D13F-488B-8196-85E06FAB682E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "82F257F4-CB62-4C6F-8866-AA253EC8C0C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "79AB6F6F-2FE3-4FC3-9009-D40EA852711F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82F4D88-779D-4D5D-96CD-2B31B61BA29E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA0DABD9-DE15-4619-8668-0277A67F5205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A80D1CBE-DA6D-4939-A4A4-8F237C97F76C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "40BEC573-A346-4F07-8053-A5F6E92A343C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A777651-D2B2-47E0-A13C-BD667635F3E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B017F95A-90F8-4DE4-B74F-ABB712F32987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1503C4CB-5D58-4523-860C-4B637AD91CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55050BF2-A950-45FF-8CD7-7689431AD82A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1253161D-F1C8-46D6-B970-20335071500E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE401B3-6291-4EA8-8800-0350BAC0B22E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0D45AE-F0FE-4005-80FB-FEFD2DCCE7D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5663CAA-0859-447E-8489-02CE4315DF91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "480AE325-6DE1-4769-A931-0C6F40D15267",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE23B6C2-354C-47BE-87B9-D4A0A3EE8ADC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC657077-8955-4CE6-93D8-F78B1BA3A949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "43FADD00-822C-4BA2-A39F-1459AD786683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D863DE9E-FD9E-4EA1-9615-02D678813AB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*",
              "matchCriteriaId": "3ABD501B-351E-4B4E-9B0B-CF8DCBC72E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AA39559-D170-4644-B04D-D6D806B5F33C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "54954434-86BC-403C-949D-E9DA8931FE6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9A88E6C-BE39-4668-BD0F-EBDBA41010F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA7BF77C-68A1-421B-A446-6206354CA7FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF45B5A6-0D49-494F-98A0-CCCBB0CBB882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB874C78-3F05-4053-A685-40DE7055359C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BC0FFB2-58E1-47D2-ACB0-9102D4E09675",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "654F2F75-42D4-4D7A-A8B8-F1C580ABDCA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "648439C2-2459-4AB3-9E9A-B63F5030A4AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "13CF5422-62D0-4777-AA94-5C166AEA4AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "19420CF9-1B33-422F-8D47-A8FE58F84944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6EA8986-0845-4F67-9429-C6DAA0006C85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7FE29FD-889A-449D-BD1F-648F06D81F5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F6C04D0-05E9-41C8-B15B-A3A0DBFE0E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3631CE91-D41D-4758-B3D2-3950BC0E2455",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "27C92877-5046-4F04-A173-3A327ADACCE0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "moxieplayer.as in Moxiecode moxieplayer, as used in the TinyMCE Media plugin in WordPress before 3.5.2 and other products, does not consider the presence of a # (pound sign) character during extraction of the QUERY_STRING, which allows remote attackers to pass arbitrary parameters to a Flash application, and conduct content-spoofing attacks, via a crafted string after a ? (question mark) character."
    },
    {
      "lang": "es",
      "value": "moxieplayer.as en Moxiecode moxieplayer, como es usado en el plugin TinyMCE Media en WordPress anterior a v3.5.2 y otros productos, no tiene en cuenta la presencia de un car\u00e1cter # (signo almohadilla), durante la extracci\u00f3n de la QUERY_STRING, que permite a atacantes remotos para pasar par\u00e1metros arbitrarios a una aplicaci\u00f3n Flash, y realizar ataques de suplantaci\u00f3n de contenido, una cadena hecha a mano despu\u00e9s de un car\u00e1cter ? (signo de interrogaci\u00f3n)."
    }
  ],
  "id": "CVE-2013-2204",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-07-08T20:55:01.117",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://codex.wordpress.org/Version_3.5.2"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://wordpress.org/news/2013/06/wordpress-3-5-2/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2013/dsa-2718"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=976784"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/moxiecode/moxieplayer/commit/b61ac518ffa2657e2dc9019b2dcf2f3f37dbfab0"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://codex.wordpress.org/Version_3.5.2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://wordpress.org/news/2013/06/wordpress-3-5-2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2718"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=976784"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/moxiecode/moxieplayer/commit/b61ac518ffa2657e2dc9019b2dcf2f3f37dbfab0"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}