|
Message-Id: <20150625012106.1E8F8B2E283@smtpvbsrv1.mitre.org> Date: Wed, 24 Jun 2015 21:21:06 -0400 (EDT) From: cve-assign@...re.org To: disclosure@...sec.de Cc: cve-assign@...re.org, oss-security@...ts.openwall.com Subject: Re: CVE Request for Wordpress-Plugin Broken Link Checker v1.10.8: Persistent XSS in admin panel enabled by modified headers -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 > Persistent XSS in wordpress-admin-panel enabled by not proper sanitized > HTTP-Headers. > There are no special priviliges required to exploit this vulnerability. > fixed in version 1.10.9, 2015-06-19 > https://wordpress.org/plugins/broken-link-checker/changelog/ >> Fixed a security vulnerability where part of the log data visibile in >> the "Details" view was not properly sanitized. Use CVE-2015-5057. - -- CVE assignment team, MITRE CVE Numbering Authority M/S M300 202 Burlington Road, Bedford, MA 01730 USA [ PGP key available through http://cve.mitre.org/cve/request_id.html ] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.14 (SunOS) iQEcBAEBAgAGBQJVi1a+AAoJEKllVAevmvms/QgIAJyJGmjfYa6hrC1WGDacj6Dd OT3keKp81n2peXJX9xoEyVmqxE6BNojePbNpG+tkrjlODB6g3Zp6wC3VnSbuxT1e KGA0/qNtiRT30+tiEFwwbofG58UAzCKlG5k/6oB0WSJP//OsquHATkL4ayHl92yw G7xeWOuZHhZl7jyCgapfVBLTLIrUNNB80TOiGUY3OcjL4J2PQP5AlCcqCqUcCkij hqBWpkrSs2lbOs57K5oJRdGHlVdGEp2zXDTlXLPBbwctR0S+0BkrF1lIW2RxLmwJ 5qAuL/70t1Wj1sJ5odpMG3bMvOE2B7iTW6HCLqzQLjY8r3ADtY+o82Pa03OKHrI= =yIkG -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.