blob: 1d1ec1b9aab31e0fbac4b63ac6c4efeeca5f7f08 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
|
<define-tag description>LTS security update</define-tag>
<define-tag moreinfo>
<p>Several vulnerabilities were discovered in wordpress, a web blogging
tool. The Common Vulnerabilities and Exposures project identifies the
following issues.</p>
<ul>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2016-9263">CVE-2016-9263</a>
<p>When domain-based flashmediaelement.swf sandboxing is not used,
allows remote attackers to conduct cross-domain Flash injection
(XSF) attacks by leveraging code contained within the
wp-includes/js/mediaelement/flashmediaelement.swf file.</p>
<p>This issue was resolved by completely removing
flashmediaelement.swf.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14718">CVE-2017-14718</a>
<p>WordPress was susceptible to a Cross-Site Scripting attack in the
link modal via a javascript: or data: URL.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14719">CVE-2017-14719</a>
<p>WordPress was vulnerable to a directory traversal attack during
unzip operations in the ZipArchive and PclZip components.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14720">CVE-2017-14720</a>
<p>WordPress allowed a Cross-Site scripting attack in the template list
view via a crafted template name.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14721">CVE-2017-14721</a>
<p>WordPress allowed Cross-Site scripting in the plugin editor via a
crafted plugin name.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14722">CVE-2017-14722</a>
<p>WordPress allowed a Directory Traversal attack in the Customizer
component via a crafted theme filename.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14723">CVE-2017-14723</a>
<p>WordPress mishandled % characters and additional placeholder values
in $wpdb->prepare, and thus did not properly address the possibility
of plugins and themes enabling SQL injection attacks.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14725">CVE-2017-14725</a>
<p>WordPress was susceptible to an open redirect attack in
wp-admin/user-edit.php.</p></li>
<li><a href="https://security-tracker.debian.org/tracker/CVE-2017-14990">CVE-2017-14990</a>
<p>WordPress stores cleartext wp_signups.activation_key values (but
stores the analogous wp_users.user_activation_key values as hashes),
which might make it easier for remote attackers to hijack
unactivated user accounts by leveraging database read access
(such as access gained through an unspecified SQL injection
vulnerability).</p></li>
</ul>
<p>For Debian 7 <q>Wheezy</q>, these problems have been fixed in version
3.6.1+dfsg-1~deb7u17.</p>
<p>We recommend that you upgrade your wordpress packages.</p>
<p>Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <a href="https://wiki.debian.org/LTS">https://wiki.debian.org/LTS</a></p>
</define-tag>
# do not modify the following line
#include "$(ENGLISHDIR)/lts/security/2017/dla-1151.data"
# $Id: $
|