Full Disclosure mailing list archives

[ GLSA 200507-02 ] WordPress: Multiple vulnerabilities


From: Thierry Carrez <koon () gentoo org>
Date: Mon, 04 Jul 2005 15:03:11 +0200

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200507-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

  Severity: High
     Title: WordPress: Multiple vulnerabilities
      Date: July 04, 2005
      Bugs: #97374
        ID: 200507-02

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

WordPress contains PHP script injection, cross-site scripting and path
disclosure vulnerabilities.

Background
==========

WordPress is a PHP and MySQL based content management and publishing
system.

Affected packages
=================

    -------------------------------------------------------------------
     Package             /  Vulnerable  /                   Unaffected
    -------------------------------------------------------------------
  1  www-apps/wordpress      < 1.5.1.3                      >= 1.5.1.3

Description
===========

James Bercegay of the GulfTech Security Research Team discovered that
WordPress insufficiently checks data passed to the XML-RPC server. He
also discovered that WordPress has several cross-site scripting and
full path disclosure vulnerabilities.

Impact
======

An attacker could use the PHP script injection vulnerabilities to
execute arbitrary PHP script commands. Furthermore the cross-site
scripting vulnerabilities could be exploited to execute arbitrary
script code in a user's browser session in context of a vulnerable
site.

Workaround
==========

There are no known workarounds at this time.

Resolution
==========

All WordPress users should upgrade to the latest available version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=www-apps/wordpress-1.5.1.3"

References
==========

  [ 1 ] CAN-2005-1921
        http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921
  [ 2 ] GulfTech Advisory
        http://www.gulftech.org/?node=research&article_id=00085-06282005

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

  http://security.gentoo.org/glsa/glsa-200507-02.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security () gentoo org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: