Cross-site Scripting (XSS) Affecting wordpress package, versions <3.0.4+dfsg-1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-WORDPRESS-362983
- published 3 Jan 2011
- disclosed 3 Jan 2011
How to fix?
Upgrade Debian:unstable
wordpress
to version 3.0.4+dfsg-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream wordpress
package and not the wordpress
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
Multiple cross-site scripting (XSS) vulnerabilities in KSES, as used in WordPress before 3.0.4, allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) the & (ampersand) character, (2) the case of an attribute name, (3) a padded entity, and (4) an entity that is not in normalized form.
References
- https://security-tracker.debian.org/tracker/CVE-2010-4536
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053289.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/053293.html
- http://core.trac.wordpress.org/changeset/17172/branches/3.0
- http://wordpress.org/news/2010/12/3-0-4-update/
- http://www.vupen.com/english/advisories/2010/3335
- http://www.vupen.com/english/advisories/2011/0167
- http://www.openwall.com/lists/oss-security/2010/12/30/1
- http://secunia.com/advisories/42755
- http://secunia.com/advisories/43000
- http://www.securityfocus.com/bid/45620