|
Message-ID: <51077004.4010207@redhat.com> Date: Mon, 28 Jan 2013 23:45:24 -0700 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Henri Salo <henri@...v.fi>, Andrew Nacin <nacin@...dpress.org>, security@...dpress.org Subject: Re: CVE request: WordPress 3.1.4 (and 3.2 Release Candidate 3) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 01/28/2013 01:56 AM, Henri Salo wrote: > Hello, > > Vulnerabilities fixed in WordPress 3.1.4[1] does not yet have CVE > identifiers. As far as I can tell there is three different > issues[2][3][4]. Details of issue OSVDB:73721 from Andrew Nacin > below: > > Using specially crafted requests under certain conditions, users > without the ability to write with unfiltered HTML could add some to > a post, and could update posts where they did not have a permission > to do so. The relevant changeset is: > http://core.trac.wordpress.org/changeset/18368/branches/3.1 > > 1: http://wordpress.org/news/2011/06/wordpress-3-1-4/ 2: > http://osvdb.org/73721 WordPress Unspecified Access Restriction > Bypass 3: http://osvdb.org/73722 WordPress wp-admin/edit-tags.php > Multiple Parameter SQL Injection 4: http://osvdb.org/73723 > WordPress wp-admin/link-manager.php Multiple Parameter SQL > Injection > > Please note that these need to be CVE-2011-XXXX, thanks. > > -- Henri Salo Can the WordPress team reply with commentary so I can help make sense of this? thanks. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.13 (GNU/Linux) iQIcBAEBAgAGBQJRB3AEAAoJEBYNRVNeJnmTobUP/11ZfBUsKendTEQdq2VUQY/R 98stEMUOWnWFd99GbdQdPzRtPgq+s/dKvjyIj2OohDcQY4UfEn6cFpl75EhoxPbA FNUDrglQld57MyJh3MUGFTQHBQqjSl4ySn5xJEFv1Nq/j9qp9DZvd03lTpWdv8L7 I84+WdB71ybqpre3wRM1/RXLGjFi+PrxXsYwq0FJiDX4GrKQ5LZFeZiahvWAFYjQ Q8puHO4rxRkNxzO1ZdxJiudElD9EJaUxPDabJhgvaSAoWXFNDCKIPKKK0jv/Y19z d34E4ngvYTJZq8gtcBoOysSOb8Yv6lMUam4LGEYsVGxsoVB9nJYO5UV1G69V+A45 p1H54EoSI4jel9S2vJWUbIzRplEMH4o3iW0EnHLwi0+lK6xNuv4BDnbKsyQKoyfi REkWrGreXOIovKeCiBXyL84wGTOaQA4/Oq9WqwCNgGXlOFKA9gTa3gaVR2DeVZkY A71e+vculLGA9unHqAZlgyUFv0Uy2U/PYBM1Go+TalEA71Ja86DRgilHqJVu5O2b sh7kJ16bnYayyusvnY4dQGdAIcq6A01RHw7xJ0K2pZUeidiDrVa+oriUC7q0GWiX UutdvrsUv3PJ8Hpb64VP6L/DlvD8FmokKIhR7FAiPwjmjUIxLr5LnELrZDu20OUy 9ds0Pf073NFt5UvIGJYP =UTA2 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.