Rapid7 Vulnerability & Exploit Database

FreeBSD: VID-459DF1BA-051C-11EA-9673-4C72B94353B5: wordpress -- multiple issues

Back to Search

FreeBSD: VID-459DF1BA-051C-11EA-9673-4C72B94353B5: wordpress -- multiple issues

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
10/14/2019
Created
11/14/2019
Added
11/13/2019
Modified
11/13/2019

Description

wordpress developers reports:

Props to Evan Ricafort for finding an issue where stored XSS (cross-site scripting)

could be added via the Customizer.

rops to J.D. Grimes who found and disclosed a method of viewing unauthenticated posts.

Props to Weston Ruter for finding a way to create a stored XSS to inject Javascript

into style tags.

rops to David Newman for highlighting a method to poison the cache of JSON GET requests

via the Vary: Origin header.

Props to Eugene Kolodenker who found a server-side request forgery in the way that URLs

are validated.

Props to Ben Bidner of the WordPress Security Team who discovered issues related to

referrer validation in the admin.

Solution(s)

  • freebsd-upgrade-package-de-wordpress
  • freebsd-upgrade-package-fr-wordpress
  • freebsd-upgrade-package-ja-wordpress
  • freebsd-upgrade-package-ru-wordpress
  • freebsd-upgrade-package-wordpress
  • freebsd-upgrade-package-zh_cn-wordpress
  • freebsd-upgrade-package-zh_tw-wordpress

References

  • freebsd-upgrade-package-de-wordpress
  • freebsd-upgrade-package-fr-wordpress
  • freebsd-upgrade-package-ja-wordpress
  • freebsd-upgrade-package-ru-wordpress
  • freebsd-upgrade-package-wordpress
  • freebsd-upgrade-package-zh_cn-wordpress
  • freebsd-upgrade-package-zh_tw-wordpress

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;