

Rewterz Threat Alert – APT SideWinder Group – Active IOCs
September 10, 2021
Rewterz Threat Advisory – ICS : Delta Electronics DOPSoft Vulnerabilities
September 13, 2021
Rewterz Threat Alert – APT SideWinder Group – Active IOCs
September 10, 2021
Rewterz Threat Advisory – ICS : Delta Electronics DOPSoft Vulnerabilities
September 13, 2021Severity
Medium
Analysis Summary
CVE-2021-39200
WordPress could allow a remote attacker to obtain sensitive information, caused by leaking output data of the function wp_die() under certain conditions. By sending a specially-crafted request via JSONP, a remote attacker could exploit this vulnerability to obtain sensitive information.
CVE-2021-39201
WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the editor. A remote authenticated attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2021-39202
WordPress is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the widget editor. A remote attacker could exploit this vulnerability to inject malicious script into a Web page which would be executed in a victim’s Web browser within the security context of the hosting Web site, once the page is viewed. An attacker could use this vulnerability to steal the victim’s cookie-based authentication credentials.
CVE-2021-39203
WordPress Core could allow a remote authenticated attacker to bypass security restrictions, caused by an error in the block editor under certain conditions. An attacker could exploit this vulnerability to bypass access restrictions to view private post types/data.
Impact
- Bypass Security
- Information Disclosure
- Cross-site scripting
- Unauthorized Access
Affected Vendors
WordPress
Affected Products
- WordPress WordPress 5.8.0
- WordPress WordPress 5.8 Beta
Remediation
Refer to the vendor website for the latest patches and suggested workarounds.
For CVE-2021-39200
For CVE-2021-39201
https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-wh69-25hr-h94v
For CVE-2021-39202
CVE-2021-39203