|
Message-ID: <4CF7AFEF.5090007@redhat.com> Date: Thu, 02 Dec 2010 15:40:47 +0100 From: Jan Lieskovsky <jlieskov@...hat.com> To: "Steven M. Christey" <coley@...us.mitre.org> CC: oss-security <oss-security@...ts.openwall.com>, Jon Ciesla <limb@...mserv.net> Subject: CVE Request -- Wordpress v3.0.2 SQL injection flaw + two minor XSS issues Hello Steve, vendors, Wordpress upstream has released latest v3.0.2 version, addressing one SQL injection flaw: 1), SQL injection flaw by processing trackbacks An improper input sanitization flaw was found in the way Wordpress performed trackbacks (a way to notify a website when an entry that references it is published) maintainance. A remote attacker, with Author-level privilege could use this flaw to conduct SQL injection attacks (gain further access to the site, which should be otherwise prohibited). References: [1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603 [2] http://codex.wordpress.org/Version_3.0.2 [3] http://core.trac.wordpress.org/changeset/16625 [4] https://bugzilla.redhat.com/show_bug.cgi?id=659265 The two XSS issues below are minor, as they need Wordpress administrator to perform the attack, but according to CVE philosophy, the CVE ids should be assigned for them too. But these two opened / left for further discussion: 2), XSS in requesting user credentials in order to connect to the filesystem References: [7] https://bugzilla.redhat.com/show_bug.cgi?id=659294 [8] http://codex.wordpress.org/Version_3.0.2 [9] http://core.trac.wordpress.org/changeset/16367 3), XSS when deleting a plugin References: [10] https://bugzilla.redhat.com/show_bug.cgi?id=659299 [11] http://codex.wordpress.org/Version_3.0.2 [12] http://core.trac.wordpress.org/changeset/16373 Note: The other issues mentioned in: http://codex.wordpress.org/Version_3.0.2 should be only bugfixes. Steve, could you allocate CVE identifiers for this / these issue / issues? Thanks && Regards, Jan. -- Jan iankko Lieskovsky / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.