Debian Security Advisory
DLA-1151-1 wordpress -- LTS security update
- Date Reported:
- 31 Oct 2017
- Affected Packages:
- wordpress
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 876274, Bug 877629.
In Mitre's CVE dictionary: CVE-2016-9263, CVE-2017-14718, CVE-2017-14719, CVE-2017-14720, CVE-2017-14721, CVE-2017-14722, CVE-2017-14723, CVE-2017-14725, CVE-2017-14990. - More information:
-
Several vulnerabilities were discovered in wordpress, a web blogging tool. The Common Vulnerabilities and Exposures project identifies the following issues.
- CVE-2016-9263
When domain-based flashmediaelement.swf sandboxing is not used, allows remote attackers to conduct cross-domain Flash injection (XSF) attacks by leveraging code contained within the wp-includes/js/mediaelement/flashmediaelement.swf file.
This issue was resolved by completely removing flashmediaelement.swf.
- CVE-2017-14718
WordPress was susceptible to a Cross-Site Scripting attack in the link modal via a javascript: or data: URL.
- CVE-2017-14719
WordPress was vulnerable to a directory traversal attack during unzip operations in the ZipArchive and PclZip components.
- CVE-2017-14720
WordPress allowed a Cross-Site scripting attack in the template list view via a crafted template name.
- CVE-2017-14721
WordPress allowed Cross-Site scripting in the plugin editor via a crafted plugin name.
- CVE-2017-14722
WordPress allowed a Directory Traversal attack in the Customizer component via a crafted theme filename.
- CVE-2017-14723
WordPress mishandled % characters and additional placeholder values in $wpdb->prepare, and thus did not properly address the possibility of plugins and themes enabling SQL injection attacks.
- CVE-2017-14725
WordPress was susceptible to an open redirect attack in wp-admin/user-edit.php.
- CVE-2017-14990
WordPress stores cleartext wp_signups.activation_key values (but stores the analogous wp_users.user_activation_key values as hashes), which might make it easier for remote attackers to hijack unactivated user accounts by leveraging database read access (such as access gained through an unspecified SQL injection vulnerability).
For Debian 7
Wheezy
, these problems have been fixed in version 3.6.1+dfsg-1~deb7u17.We recommend that you upgrade your wordpress packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2016-9263