Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20150723200427.B6E67B2E539@smtpvbsrv1.mitre.org>
Date: Thu, 23 Jul 2015 16:04:27 -0400 (EDT)
From: cve-assign@...re.org
To: henri@...v.fi
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: WordPress 4.2.2 and earlier cross-site scripting vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> https://wordpress.org/news/2015/07/wordpress-4-2-3/

> WordPress versions 4.2.2 and earlier are affected by a cross-site
> scripting vulnerability, which could allow users with the Contributor
> or Author role to compromise a site. This was initially reported by
> Jon Cave and fixed by Robert Chapin, both of the WordPress security
> team

Use CVE-2015-5622.


> We also fixed an issue where it was possible for a user with
> Subscriber permissions to create a draft through Quick Draft.

Use CVE-2015-5623.


We think the vulnerability mappings are:

CVE-2015-5622 = https://core.trac.wordpress.org/changeset/33359

Note that the news URL says 'fixed by <a
href="http://www.miqrogroove.com/">Robert Chapin</a>' and 33359 says
"Props miqrogroove."
https://core.trac.wordpress.org/changeset/33359/trunk/tests/phpunit/tests/kses.php
has:

           array( 
               'a', 
               'href="javascript:alert(1)"', 
               'href="alert(1)"', 
           ), 

[ there has been discussion of 33359, although possibly not about any
remaining security problem - see
https://core.trac.wordpress.org/ticket/15694#comment:24 ]


CVE-2015-5623 = https://core.trac.wordpress.org/changeset/33357

Note that
https://core.trac.wordpress.org/changeset/33357/trunk/src/wp-admin/post.php
makes a change to the "case 'post-quickdraft-save'" section of the
wp-admin/post.php file.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVsUhEAAoJEKllVAevmvmsRrIH/RM7N13JnxT91K8kIqEJwRn0
cnPLrUgiX8hBVtWr/Nl20n1wNzG8BYEKRUHbq3AjwgOzzLkRa1d5bNfY565pjkKe
h9QfYlFVZ9AkI0jDHMMxcpuX9DbiZW3c32dWE8xtsA421aZnC+lftZID4SOYkMJO
Fut7UfedkYcmLO2L0o7tm0QcOZS5aAjrJy1NHsqClMW+3AI6xvccYR8LN9JOAkFU
X+pjSom1Q8QDMaEOFOCjZI2nAbZNCehKd6IBWavcgAWZcB+RIxYTjsxl4FE6bvxH
dDp8joXZpy62s/bXlhoOiZTgxDV/PpKourV8tg7uU37m35kisQflcBEJn+ptqdg=
=IbzO
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.