|
Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200701-10] WordPress: Multiple vulnerabilities Vulnerability Scan
Vulnerability Scan Summary WordPress: Multiple vulnerabilities
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200701-10
(WordPress: Multiple vulnerabilities)
When decoding trackbacks with alternate character sets, WordPress does
not correctly sanitize the entries before further modifying a SQL
query. WordPress also displays different error messages in wp-login.php
based upon whether or not a user exists. David Kierznowski has
discovered that WordPress fails to properly sanitize recent file
information in /wp-admin/templates.php before sending that information
to a browser.
Impact
A possible hacker could inject arbitrary SQL into WordPress database queries.
A possible hacker could also acertain if a WordPress user existed by trying
to login as that user, better facilitating brute force attacks. Lastly,
a possible hacker authenticated to view the administrative section of a
WordPress instance could try to edit a file with a malicious filename
this may cause arbitrary HTML or JavaScript to be executed in users'
browsers viewing /wp-admin/templates.php.
Workaround
There is no known workaround at this time.
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6808
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0107
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0109
Solution:
All WordPress users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/wordpress-2.0.6"
Threat Level: Medium
Click HERE for more information and discussions on this network vulnerability scan.
|