|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
WordPress WP to Twitter: sending Tweets
Synthesis of the vulnerability
An attacker can use WordPress WP to Twitter, in order to send spoofed Tweets.
Vulnerable systems: WordPress Plugins ~ not comprehensive.
Severity of this threat: 2/4.
Consequences of an attack: data creation/edition.
Pirate's origin: internet client.
Creation date: 10/09/2014.
Références of this weakness: VIGILANCE-VUL-15320.
Description of the vulnerability
The WP to Twitter plugin can be installed on WordPress.
However, access permissions are not always checked.
An attacker can therefore use WordPress WP to Twitter, in order to send spoofed Tweets.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a software vulnerability database. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The technology watch team tracks security threats targeting the computer system.