summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'metadata/glsa/glsa-200703-23.xml')
-rw-r--r--metadata/glsa/glsa-200703-23.xml89
1 files changed, 89 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-200703-23.xml b/metadata/glsa/glsa-200703-23.xml
new file mode 100644
index 000000000000..e409fce1c03e
--- /dev/null
+++ b/metadata/glsa/glsa-200703-23.xml
@@ -0,0 +1,89 @@
+<?xml version="1.0" encoding="utf-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="200703-23">
+ <title>WordPress: Multiple vulnerabilities</title>
+ <synopsis>
+ Wordpress contains several cross-site scripting, cross-site request forgery
+ and information leak vulnerabilities.
+ </synopsis>
+ <product type="ebuild">wordpress</product>
+ <announced>2007-03-20</announced>
+ <revised count="01">2007-03-20</revised>
+ <bug>168529</bug>
+ <access>remote</access>
+ <affected>
+ <package name="www-apps/wordpress" auto="yes" arch="*">
+ <vulnerable range="le">2.1.2</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>
+ WordPress is a popular personal publishing platform with a web
+ interface.
+ </p>
+ </background>
+ <description>
+ <p>
+ WordPress contains cross-site scripting or cross-site scripting forgery
+ vulnerabilities reported by:
+ </p>
+ <ul><li>g30rg3_x in the "year"
+ parameter of the wp_title() function</li>
+ <li>Alexander Concha in the
+ "demo" parameter of wp-admin/admin.php</li>
+ <li>Samenspender and Stefan
+ Friedli in the "post" parameter of wp-admin/post.php and
+ wp-admin/page.php, in the "cat_ID" parameter of wp-admin/categories.php
+ and in the "c" parameter of wp-admin/comment.php</li>
+ <li>PsychoGun in
+ the "file" parameter of wp-admin/templates.php</li>
+ </ul> <p>
+ </p>
+ <p>
+ Additionally, WordPress prints the full PHP script paths in some error
+ messages.
+ </p>
+ </description>
+ <impact type="low">
+ <p>
+ The cross-site scripting vulnerabilities can be triggered to steal
+ browser session data or cookies. A remote attacker can entice a user to
+ browse to a specially crafted web page that can trigger the cross-site
+ request forgery vulnerability and perform arbitrary WordPress actions
+ with the permissions of the user. Additionally, the path disclosure
+ vulnerability could help an attacker to perform other attacks.
+ </p>
+ </impact>
+ <workaround>
+ <p>
+ There is no known workaround at this time for all these
+ vulnerabilities.
+ </p>
+ </workaround>
+ <resolution>
+ <p>
+ Due to the numerous recently discovered vulnerabilities in WordPress,
+ this package has been masked in the portage tree. All WordPress users
+ are advised to unmerge it.
+ </p>
+ <code>
+
+ # emerge --unmerge "www-apps/wordpress"</code>
+ </resolution>
+ <references>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1049">CVE-2007-1049</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1230">CVE-2007-1230</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1244">CVE-2007-1244</uri>
+ <uri link="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1409">CVE-2007-1409</uri>
+ <uri link="https://secunia.com/advisories/24430/">SA 24430</uri>
+ </references>
+ <metadata tag="requester" timestamp="2007-03-09T22:36:03Z">
+ falco
+ </metadata>
+ <metadata tag="submitter" timestamp="2007-03-17T15:44:31Z">
+ falco
+ </metadata>
+ <metadata tag="bugReady" timestamp="2007-03-20T11:36:10Z">
+ falco
+ </metadata>
+</glsa>