Debian Security Advisory
DSA-1564-1 wordpress -- multiple vulnerabilities
- Date Reported:
- 01 May 2008
- Affected Packages:
- Security database references:
- In Mitre's CVE dictionary: CVE-2007-3639, CVE-2007-4153, CVE-2007-4154, CVE-2007-0540.
- More information:
Several remote vulnerabilities have been discovered in WordPress, a weblog manager. The Common Vulnerabilities and Exposures project identifies the following problems:
Insufficient input sanitising allowed for remote attackers to redirect visitors to external websites.
Multiple cross-site scripting vulnerabilities allowed remote authenticated administrators to inject arbitrary web script or HTML.
SQL injection vulnerability allowed allowed remote authenticated administrators to execute arbitrary SQL commands.
WordPress allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a file with a binary content type, which is downloaded even though it cannot contain usable pingback data.
- [no CVE name yet]
Insufficient input sanitising caused an attacker with a normal user account to access the administrative interface.
For the stable distribution (etch), these problems have been fixed in version 2.0.10-1etch2.
For the unstable distribution (sid), these problems have been fixed in version 2.2.3-1.
We recommend that you upgrade your wordpress package.
- Fixed in:
Debian GNU/Linux 4.0 (etch)
- Architecture-independent component:
MD5 checksums of the listed files are available in the original advisory.