Cross-site Scripting (XSS) Affecting wordpress package, versions <4.2+dfsg-1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-WORDPRESS-363503
- published 5 Aug 2015
- disclosed 5 Aug 2015
How to fix?
Upgrade Debian:unstable
wordpress
to version 4.2+dfsg-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream wordpress
package and not the wordpress
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
Multiple cross-site scripting (XSS) vulnerabilities in WordPress before 4.1.2, when MySQL is used without strict mode, allow remote attackers to inject arbitrary web script or HTML via a (1) four-byte UTF-8 character or (2) invalid character that reaches the database layer, as demonstrated by a crafted character in a comment.
References
- https://security-tracker.debian.org/tracker/CVE-2015-3438
- http://www.debian.org/security/2015/dsa-3250
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157391.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158271.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158278.html
- http://codex.wordpress.org/Version_4.1.2
- https://cedricvb.be/post/wordpress-stored-xss-vulnerability-4-1-2/
- https://wordpress.org/news/2015/04/wordpress-4-1-2/
- https://wpvulndb.com/vulnerabilities/7929
- http://www.securityfocus.com/bid/74269
- http://www.securitytracker.com/id/1032207