- The web application supports file uploads and Acunetix was able to upload a Java Applet (.class/.jar) file. If a web browser loads a Java applet from a trusted site, the browser provides no security warning. If an attacker can upload a CLASS/JAR file with an applet, the file is executed even if the web page, which embeds the applet is located on a different site. An attacker could use a file upload function to build an XSS attack using active content.
- Restrict file types accepted for upload: check the file extension and only allow certain files to be uploaded. Use a whitelist approach instead of a blacklist. Check for double extensions such as .php.png. Check for files without a filename like .htaccess (on ASP.NET, check for configuration files like web.config). Change the permissions on the upload folder so the files within it are not executable. If possible, rename the files that are uploaded.
- WordPress Plugin PHP Event Calendar for WordPress Arbitrary File Upload (1.6)
- WordPress Plugin Google Analytics Dashboard Cross-Site Scripting (2.1.1)
- WordPress Plugin Event Calendar WD-Responsive Event Calendar Cross-Site Scripting (1.0.93)
- WordPress Plugin Gravity Forms-Clockwork SMS Cross-Site Scripting (2.2)
- SMTP open mail relay