lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 10 Jun 2014 12:41:46 +0000
From: dxw Security <>
Subject: [FD] CSRF in JW Player for Flash & HTML5 Video 2.1.2 permits
	deletion of players (WordPress plugin)

Software: JW Player for Flash & HTML5 Video
Version: 2.1.2
Advisory ID: dxw-1970-1201
CVE: Awaiting assignment
CVSS: 4.3 (Medium; AV:N/AC:M/Au:N/C:N/I:N/A:P)

CSRF in JW Player for Flash & HTML5 Video 2.1.2 permits deletion of players

An attacker can cause an admin user to remove players if they can convince them to visit an URL of their choice.

Proof of concept
Log in as admin, create a new player, visit this URL (changing localhost, and changing player_id to the ID of the player you just created):

Disable the plugin until a fix is available.

Disclosure policy
dxw believes in responsible disclosure. Your attention is drawn to our disclosure policy:

Please contact us on to acknowledge this report if you received it via a third party (for example, as they generally cannot communicate with us on your behalf.

This vulnerability will be published if we do not receive a response to this report with 14 days.


2014-04-08: Discovered
2014-04-10: Reported
2014-06-10: Report not acknowledged, no fix announced. Published.

<<<<<<< HEAD

Discovered by dxw:
Tom Adams

Discovered by dxw:
Tom Adams
>>>>>>> 65c687d5cb3c4aa66c28a30a4f2aaf33169dc464
Please visit for more information.

Sent through the Full Disclosure mailing list
Web Archives & RSS:

Powered by blists - more mailing lists