Debian Security Advisory
DLA-1151-1 wordpress -- LTS security update
- Date Reported:
- 31 Oct 2017
- Affected Packages:
- Security database references:
- In the Debian bugtracking system: Bug 876274, Bug 877629.
In Mitre's CVE dictionary: CVE-2016-9263, CVE-2017-14718, CVE-2017-14719, CVE-2017-14720, CVE-2017-14721, CVE-2017-14722, CVE-2017-14723, CVE-2017-14725, CVE-2017-14990.
- More information:
Several vulnerabilities were discovered in wordpress, a web blogging tool. The Common Vulnerabilities and Exposures project identifies the following issues.
When domain-based flashmediaelement.swf sandboxing is not used, allows remote attackers to conduct cross-domain Flash injection (XSF) attacks by leveraging code contained within the wp-includes/js/mediaelement/flashmediaelement.swf file.
This issue was resolved by completely removing flashmediaelement.swf.
WordPress was vulnerable to a directory traversal attack during unzip operations in the ZipArchive and PclZip components.
WordPress allowed a Cross-Site scripting attack in the template list view via a crafted template name.
WordPress allowed Cross-Site scripting in the plugin editor via a crafted plugin name.
WordPress allowed a Directory Traversal attack in the Customizer component via a crafted theme filename.
WordPress mishandled % characters and additional placeholder values in $wpdb->prepare, and thus did not properly address the possibility of plugins and themes enabling SQL injection attacks.
WordPress was susceptible to an open redirect attack in wp-admin/user-edit.php.
WordPress stores cleartext wp_signups.activation_key values (but stores the analogous wp_users.user_activation_key values as hashes), which might make it easier for remote attackers to hijack unactivated user accounts by leveraging database read access (such as access gained through an unspecified SQL injection vulnerability).
For Debian 7
Wheezy, these problems have been fixed in version 3.6.1+dfsg-1~deb7u17.
We recommend that you upgrade your wordpress packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS