Lucene search

K
debianDebianDEBIAN:DLA-2630-1:71736
HistoryApr 21, 2021 - 6:46 a.m.

[SECURITY] [DLA 2630-1] wordpress security update

2021-04-2106:46:28
lists.debian.org
48

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

0.005 Low

EPSS

Percentile

75.1%


Debian LTS Advisory DLA-2630-1 [email protected]
https://www.debian.org/lts/security/ Utkarsh Gupta
April 21, 2021 https://wiki.debian.org/LTS


Package : wordpress
Version : 4.7.20+dfsg-1+deb9u1
CVE ID : CVE-2021-29447 CVE-2021-29450
Debian Bug : 987065

CVE-2021-29447

Wordpress is an open source CMS. A user with the ability to
upload files (like an Author) can exploit an XML parsing issue
in the Media Library leading to XXE attacks. This requires
WordPress installation to be using PHP 8. Access to internal
files is possible in a successful XXE attack.

CVE-2021-29450

Wordpress is an open source CMS. One of the blocks in the
WordPress editor can be exploited in a way that exposes
password-protected posts and pages. This requires at least
contributor privileges.

For Debian 9 stretch, these problems have been fixed in version
4.7.20+dfsg-1+deb9u1.

We recommend that you upgrade your wordpress packages.

For the detailed security status of wordpress please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wordpress

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

0.005 Low

EPSS

Percentile

75.1%