Lucene search

K
gentooGentoo FoundationGLSA-200506-04
HistoryJun 06, 2005 - 12:00 a.m.

Wordpress: Multiple vulnerabilities

2005-06-0600:00:00
Gentoo Foundation
security.gentoo.org
9

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.018 Low

EPSS

Percentile

88.1%

Background

WordPress is a PHP and MySQL based content management and publishing system.

Description

Due to a lack of input validation, WordPress is vulnerable to SQL injection and XSS attacks.

Impact

An attacker could use the SQL injection vulnerabilities to gain information from the database. Furthermore the cross-site scripting issues give an attacker the ability to inject and execute malicious script code or to steal cookie-based authentication credentials, potentially compromising the victim’s browser.

Workaround

There is no known workaround at this time.

Resolution

All Wordpress users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-apps/wordpress-1.5.1.2"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-apps/wordpress< 1.5.1.2UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.018 Low

EPSS

Percentile

88.1%