All-in-One Event Calendar
exploitable XSS issues (6 posts)

  1. JustinFYI
    Posted 2 years ago #

    @Edededededededed: According to the reference you posted, the vulnerable versions are 1.4, 1.5 and probably prior. And the solution states that you should update to ver. 1.8.2.

  2. Edededededededed
    Posted 2 years ago #

    No, its common for security researchers to indicate what version # of vendor code the exposure was applicable to at the time the research was published.

    The issue is not fixed with the most recent version of the plugin.

    The obligation is on the vendor to patch and release new of the fix and until they do, you can assume its exploitable or retest it yourself by following the instructions in the article.


  3. Edededededededed
    Posted 2 years ago #

    @Justin FYI,
    The vendor does not state, I had not stated, NO ONE BUT YOU have said some one stated. But no one has stated 1.8.2 is not vulnerable.

    So were left with your factually incorrect post.

    So if you might be so kind as to please restate it or remove it. As your your post (a few days ago) has real potential to confuse or even hurt peoples ability to know they are vulnerable with ALL versions of the plugin from rev 1.4 to the current rev. 1.8.2

    Your doing no one a valuable service by inadvertently stating wrong information when people have worked their buts off to provide real value.

  4. JustinFYI
    Posted 2 years ago #

    @Eded...ded, seriously? Let me spell it out for you:

    Your post contains a link within the references portion of that original post: [1] High-Tech Bridge Advisory HTB23082. That link provides the following:

    High-Tech Bridge > Research > Security Advisories > HTB23082 Security Advisory

    Multiple XSS vulnerabilities in All-in-One Event Calendar Plugin for WordPress

    Advisory ID: HTB23082
    Product: All-in-One Event Calendar Plugin for WordPress
    Vendor: The Seed Studio
    Vulnerable Versions: 1.4, 1.5 and probably prior
    Tested Version: 1.4
    Vendor Notification: March 21, 2012
    Public Disclosure: April 11, 2012
    Latest Update: April 13, 2012
    Vulnerability Type: Cross-Site Scripting [CWE-79]
    CVE Reference: CVE-2012-1835
    CVSSv2 Base Score: 4.3 (AV:N/AC:M/Au:N/C:N/I:P/A:N)
    Solution Status: Fixed by Vendor
    Risk Level: Medium
    [Medium Risk]
    Discovered and Provided: High-Tech Bridge Security Research Lab

    Scroll further down on that link and you'll see:

    Upgrade to version 1.8.2

    So, next time you think about flapping your gums, try and stay updated with the references in your own post.

    And, if you still find that risk continues to exist, do us all a favor, fix your references first, then notify the source of the "wrong" information before you confuse the people who actually check the references posted.

  5. GeaVox
    Posted 2 years ago #

    Could we dispense with the testosterone attacks and please get the facts out?

    @Edededededededed Thank you for posting your warning, thanks to you I have deactivated the plugin which, though very nice, I have to say, you say could expose my site to attack.

    @JustinFYI Whatever Edededededededed may have posted, all you needed to do is politely point out that the Vendor had issued an update that addressed the vulnerability.

    @Edededededededed Perhaps your response could have been put less aggressively, however, I do agree that the post did create a false impression, that version 1.8.2 of the plugin is now 'safe'.

    At the end of all that, I am still uncertain as to whether The Seed have addressed the issue; should this not be reported to the WordPress folk? Is there a workaround?

    Anyway, here's wishing you both a very Happy and Chilled New Year!
    Gea xx

    cc. The Seed

  6. esmi
    Forum Moderator
    Posted 2 years ago #

    Please address all details regarding unsafe plugins to plugins [at] wordpress [dot] org.

Topic Closed

This topic has been closed to new replies.

About this Plugin

  • All-in-One Event Calendar
  • Frequently Asked Questions
  • Support Threads
  • Reviews

About this Topic


No tags yet.