Gentoo Archives: gentoo-announce

From: Thierry Carrez <koon@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200507-02 ] WordPress: Multiple vulnerabilities
Date: Mon, 04 Jul 2005 13:17:20
Message-Id: 42C9338F.2070004@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200507-02
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: WordPress: Multiple vulnerabilities
9 Date: July 04, 2005
10 Bugs: #97374
11 ID: 200507-02
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 WordPress contains PHP script injection, cross-site scripting and path
19 disclosure vulnerabilities.
20
21 Background
22 ==========
23
24 WordPress is a PHP and MySQL based content management and publishing
25 system.
26
27 Affected packages
28 =================
29
30 -------------------------------------------------------------------
31 Package / Vulnerable / Unaffected
32 -------------------------------------------------------------------
33 1 www-apps/wordpress < 1.5.1.3 >= 1.5.1.3
34
35 Description
36 ===========
37
38 James Bercegay of the GulfTech Security Research Team discovered that
39 WordPress insufficiently checks data passed to the XML-RPC server. He
40 also discovered that WordPress has several cross-site scripting and
41 full path disclosure vulnerabilities.
42
43 Impact
44 ======
45
46 An attacker could use the PHP script injection vulnerabilities to
47 execute arbitrary PHP script commands. Furthermore the cross-site
48 scripting vulnerabilities could be exploited to execute arbitrary
49 script code in a user's browser session in context of a vulnerable
50 site.
51
52 Workaround
53 ==========
54
55 There are no known workarounds at this time.
56
57 Resolution
58 ==========
59
60 All WordPress users should upgrade to the latest available version:
61
62 # emerge --sync
63 # emerge --ask --oneshot --verbose ">=www-apps/wordpress-1.5.1.3"
64
65 References
66 ==========
67
68 [ 1 ] CAN-2005-1921
69 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1921
70 [ 2 ] GulfTech Advisory
71 http://www.gulftech.org/?node=research&article_id=00085-06282005
72
73 Availability
74 ============
75
76 This GLSA and any updates to it are available for viewing at
77 the Gentoo Security Website:
78
79 http://security.gentoo.org/glsa/glsa-200507-02.xml
80
81 Concerns?
82 =========
83
84 Security is a primary focus of Gentoo Linux and ensuring the
85 confidentiality and security of our users machines is of utmost
86 importance to us. Any security concerns should be addressed to
87 security@g.o or alternatively, you may file a bug at
88 http://bugs.gentoo.org.
89
90 License
91 =======
92
93 Copyright 2005 Gentoo Foundation, Inc; referenced text
94 belongs to its owner(s).
95
96 The contents of this document are licensed under the
97 Creative Commons - Attribution / Share Alike license.
98
99 http://creativecommons.org/licenses/by-sa/2.0

Attachments

File name MIME type
signature.asc application/pgp-signature