The tweet_info function in class/__functions.php in the SecureMoz Security Audit plugin 1.0.5 and earlier for WordPress does not use an HTTPS session for downloading serialized data, which allows man-in-the-middle attackers to conduct PHP object injection attacks and execute arbitrary PHP code by modifying the client-server data stream. NOTE: some of these details are obtained from third party information.
Advisories
Source ID Title
EUVD EUVD EUVD-2015-6765 The tweet_info function in class/__functions.php in the SecureMoz Security Audit plugin 1.0.5 and earlier for WordPress does not use an HTTPS session for downloading serialized data, which allows man-in-the-middle attackers to conduct PHP object injection attacks and execute arbitrary PHP code by modifying the client-server data stream. NOTE: some of these details are obtained from third party information.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T07:29:24.863Z

Reserved: 2015-09-06T00:00:00

Link: CVE-2015-6828

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-09-16T14:59:04.417

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-6828

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses