oss-sec mailing list archives
Re: CVE Request -- WordPress
From: "Steven M. Christey" <coley () linus mitre org>
Date: Tue, 18 Aug 2009 16:45:45 -0400 (EDT)
On Tue, 21 Jul 2009, Jan Lieskovsky wrote:
latest WordPress 2.8.2 version has addressed a XSS vulnerability: XSS via unescaped HTML URLs as author comments in the admin page
====================================================== Name: CVE-2009-2851 Status: Candidate URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2851 Reference: MLIST:[oss-security] 20090721 CVE Request -- WordPress Reference: URL:http://www.openwall.com/lists/oss-security/2009/07/21/1 Reference: CONFIRM:http://bugs.gentoo.org/show_bug.cgi?id=278492 Reference: CONFIRM:http://wordpress.org/development/2009/07/wordpress-2-8-2/ Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=512900 Reference: FEDORA:FEDORA-2009-8109 Reference: URL:https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01241.html Reference: FEDORA:FEDORA-2009-8114 Reference: URL:https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01253.html Reference: SECTRACK:1022589 Reference: URL:http://securitytracker.com/id?1022589 Cross-site scripting (XSS) vulnerability in the administrator interface in WordPress before 2.8.2 allows remote attackers to inject arbitrary web script or HTML via a comment author URL.
Current thread:
- CVE Request -- WordPress Jan Lieskovsky (Jul 21)
- Re: CVE Request -- WordPress Steven M. Christey (Aug 18)