Debian Security Advisory

DLA-1151-1 wordpress -- LTS security update

Date Reported:
31 Oct 2017
Affected Packages:
wordpress
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 876274, Bug 877629.
In Mitre's CVE dictionary: CVE-2016-9263, CVE-2017-14718, CVE-2017-14719, CVE-2017-14720, CVE-2017-14721, CVE-2017-14722, CVE-2017-14723, CVE-2017-14725, CVE-2017-14990.
More information:

Several vulnerabilities were discovered in wordpress, a web blogging tool. The Common Vulnerabilities and Exposures project identifies the following issues.

  • CVE-2016-9263

    When domain-based flashmediaelement.swf sandboxing is not used, allows remote attackers to conduct cross-domain Flash injection (XSF) attacks by leveraging code contained within the wp-includes/js/mediaelement/flashmediaelement.swf file.

    This issue was resolved by completely removing flashmediaelement.swf.

  • CVE-2017-14718

    WordPress was susceptible to a Cross-Site Scripting attack in the link modal via a javascript: or data: URL.

  • CVE-2017-14719

    WordPress was vulnerable to a directory traversal attack during unzip operations in the ZipArchive and PclZip components.

  • CVE-2017-14720

    WordPress allowed a Cross-Site scripting attack in the template list view via a crafted template name.

  • CVE-2017-14721

    WordPress allowed Cross-Site scripting in the plugin editor via a crafted plugin name.

  • CVE-2017-14722

    WordPress allowed a Directory Traversal attack in the Customizer component via a crafted theme filename.

  • CVE-2017-14723

    WordPress mishandled % characters and additional placeholder values in $wpdb->prepare, and thus did not properly address the possibility of plugins and themes enabling SQL injection attacks.

  • CVE-2017-14725

    WordPress was susceptible to an open redirect attack in wp-admin/user-edit.php.

  • CVE-2017-14990

    WordPress stores cleartext wp_signups.activation_key values (but stores the analogous wp_users.user_activation_key values as hashes), which might make it easier for remote attackers to hijack unactivated user accounts by leveraging database read access (such as access gained through an unspecified SQL injection vulnerability).

For Debian 7 Wheezy, these problems have been fixed in version 3.6.1+dfsg-1~deb7u17.

We recommend that you upgrade your wordpress packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS