18 May 2017

Vulnerability Details: Remote Code Execution (RCE) Vulnerability in BibleGet I/O

From time to time vulnerabilities are fixed in plugin without someone putting out a report on the vulnerability and we will put out a post detailing the vulnerability. While putting out the details of the vulnerability increases the chances of it being exploited, it also can help to identify vulnerabilities that haven’t been fully fixed (in some cases not fixed at all) and help to identify additional vulnerabilities in the plugin.

...


This post provides insights on a vulnerability in the WordPress plugin BibleGet I/O not discovered by us, where the discoverer hadn't provided the details needed for us to confirm the vulnerability while we were adding it to the data set for our service, so the rest of its contents are limited to subscribers of our service.

If you were using our service, you would have already been warned about this vulnerability if your website is vulnerable due to it. You can try out our service for free and then see the rest of the details of the vulnerability.

For existing customers, please log in to your account to view the rest of the contents of the post.

One thought on “Vulnerability Details: Remote Code Execution (RCE) Vulnerability in BibleGet I/O

  1. the current code doesn’t have any restriction on who can access the functionality.

    That means it is still open to the “other XSS”: Cross-Site Styling. That’s not as serious as Cross-Site Scripting, since it is less well known, but it still can be exploited.

Leave a Reply

Your email address will not be published.