Debian Security Advisory
DLA-568-1 wordpress -- LTS security update
- Date Reported:
- 29 Jul 2016
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 828225.
In Mitre's CVE dictionary: CVE-2016-5387, CVE-2016-5832, CVE-2016-5834, CVE-2016-5835, CVE-2016-5838, CVE-2016-5839.
- More information:
Several vulnerabilities were discovered in wordpress, a web blogging tool. The Common Vulnerabilities and Exposures project identifies the following issues.
WordPress allows remote attackers to bypass intended access restrictions and remove a category attribute from a post via unspecified vectors.
The customizer in WordPress allows remote attackers to bypass intended redirection restrictions via unspecified vectors.
Cross-site scripting (XSS) vulnerability in the wp_get_attachment_link function in wp-includes/post template.php in WordPress allows remote attackers to inject arbitrary web script or HTML via a crafted attachment name.
WordPress allows remote attackers to obtain sensitive revision-history information by leveraging the ability to read a post related to wp-admin/includes/ajax-actions.php and wp-admin/revision.php.
WordPress allows remote attackers to bypass intended password change restrictions by leveraging knowledge of a cookie.
WordPress allows remote attackers to bypass the sanitize_file_name protection mechanism via unspecified vectors.
For Debian 7
Wheezy, these problems have been fixed in version 3.6.1+dfsg-1~deb7u11.
We recommend that you upgrade your wordpress packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS