Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200701-10] WordPress: Multiple vulnerabilities Vulnerability Scan
Vulnerability Scan Summary
WordPress: Multiple vulnerabilities
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200701-10
(WordPress: Multiple vulnerabilities)
When decoding trackbacks with alternate character sets, WordPress does
not correctly sanitize the entries before further modifying a SQL
query. WordPress also displays different error messages in wp-login.php
based upon whether or not a user exists. David Kierznowski has
discovered that WordPress fails to properly sanitize recent file
information in /wp-admin/templates.php before sending that information
to a browser.
A possible hacker could inject arbitrary SQL into WordPress database queries.
A possible hacker could also acertain if a WordPress user existed by trying
to login as that user, better facilitating brute force attacks. Lastly,
a possible hacker authenticated to view the administrative section of a
WordPress instance could try to edit a file with a malicious filename
browsers viewing /wp-admin/templates.php.
There is no known workaround at this time.
All WordPress users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/wordpress-2.0.6"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.