[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244625

 
 

909

 
 

193379

 
 

277

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1871-2 wordpress -- several vulnerabilities

ID: oval:org.secpod.oval:def:600449Date: (C)2011-05-13   (M)2022-10-10
Class: PATCHFamily: unix




The previous wordpress update introduced a regression when fixing CVE-2008-4769 due to a function that was not backported with the patch. Please note that this regression only affects the oldstable distribution . For reference the original advisory text follows. Several vulnerabilities have been discovered in wordpress, weblog manager. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-6762 It was discovered that wordpress is prone to an open redirect vulnerability which allows remote attackers to conduct phishing atacks. CVE-2008-6767 It was discovered that remote attackers had the ability to trigger an application upgrade, which could lead to a denial of service attack. CVE-2009-2334 It was discovered that wordpress lacks authentication checks in the plugin configuration, which might leak sensitive information. CVE-2009-2854 It was discovered that wordpress lacks authentication checks in various actions, thus allowing remote attackers to produce unauthorised edits or additions. CVE-2009-2851 It was discovered that the administrator interface is prone to a cross-site scripting attack. CVE-2009-2853 It was discovered that remote attackers can gain privileges via certain direct requests. CVE-2008-1502 It was discovered that the _bad_protocol_once function in KSES, as used by wordpress, allows remote attackers to perform cross-site scripting attacks. CVE-2008-4106 It was discovered that wordpress lacks certain checks around user information, which could be used by attackers to change the password of a user. CVE-2008-4769 It was discovered that the get_category_template function is prone to a directory traversal vulnerability, which could lead to the execution of arbitrary code. CVE-2008-4796 It was discovered that the _httpsrequest function in the embedded snoopy version is prone to the execution of arbitrary commands via shell metacharacters in https URLs. CVE-2008-5113 It was discovered that wordpress relies on the REQUEST superglobal array in certain dangerous situations, which makes it easier to perform attacks via crafted cookies. For the stable distribution , these problems have been fixed in version 2.5.1-11+lenny1. For the oldstable distribution , these problems have been fixed in version 2.0.10-1etch5. For the testing distribution and the unstable distribution , these problems have been fixed in version 2.8.3-1. We recommend that you upgrade your wordpress packages.

Platform:
Debian 4.0
Product:
wordpress
Reference:
DSA-1871-2
CVE-2008-6762
CVE-2008-6767
CVE-2009-2334
CVE-2009-2854
CVE-2009-2851
CVE-2009-2853
CVE-2008-1502
CVE-2008-4106
CVE-2008-4769
CVE-2008-4796
CVE-2008-5113
CVE    11
CVE-2008-1502
CVE-2008-4106
CVE-2008-5113
CVE-2008-4796
...
CPE    1
cpe:/o:debian:debian_linux:4.0

© SecPod Technologies