Security update for Wordpress to fix multiple vulnerabilities including SQL Injection and Cross Site Scriptin
Reporter | Title | Published | Views | Family All 92 |
---|---|---|---|---|
OSV | wordpress - security update | 19 Aug 201500:00 | – | osv |
OSV | wordpress - regression update | 11 Aug 201500:00 | – | osv |
OSV | wordpress - security update | 11 Aug 201500:00 | – | osv |
OSV | wordpress - security update | 29 Oct 201500:00 | – | osv |
OSV | wordpress - security update | 4 Aug 201500:00 | – | osv |
OpenVAS | Debian: Security Advisory (DLA-294-1) | 8 Mar 202300:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-3332-1) | 10 Aug 201500:00 | – | openvas |
OpenVAS | Debian Security Advisory DSA 3332-1 (wordpress - security update) | 11 Aug 201500:00 | – | openvas |
OpenVAS | Fedora Update for wordpress FEDORA-2015-12148 | 14 Aug 201500:00 | – | openvas |
OpenVAS | Debian Security Advisory DSA 3383-1 (wordpress - security update) | 29 Oct 201500:00 | – | openvas |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DLA-294-1. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(85546);
script_version("2.9");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2015-2213", "CVE-2015-5622", "CVE-2015-5731", "CVE-2015-5732", "CVE-2015-5734");
script_name(english:"Debian DLA-294-1 : wordpress security update");
script_summary(english:"Checks dpkg output for the updated packages.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Debian host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"Several vulnerabilities have been fixed in Wordpress, the popular
blogging engine.
CVE-2015-2213
SQL Injection allowed a remote attacker to compromise the site.
CVE-2015-5622
The robustness of the shortcodes HTML tags filter has been improved.
The parsing is a bit more strict, which may affect your installation.
This is the corrected version of the patch that needed to be reverted
in DSA 3328-2.
CVE-2015-5731
An attacker could lock a post that was being edited.
CVE-2015-5732
Cross site scripting in a widget title allows an attacker to steal
sensitive information.
CVE-2015-5734
Fix some broken links in the legacy theme preview.
The issues were discovered by Marc-Alexandre Montpas of Sucuri, Helen
Hou-Sandí of the WordPress security team, Netanel Rubin of
Check Point, Ivan Grigorov, Johannes Schmitt of Scrutinizer and
Mohamed A. Baset.
We recommend that you upgrade your wordpress packages.
NOTE: Tenable Network Security has extracted the preceding description
block directly from the DLA security advisory. Tenable has attempted
to automatically clean and format it as much as possible without
introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://lists.debian.org/debian-lts-announce/2015/08/msg00008.html"
);
script_set_attribute(
attribute:"see_also",
value:"https://packages.debian.org/source/squeeze-lts/wordpress"
);
script_set_attribute(
attribute:"solution",
value:"Upgrade the affected wordpress, and wordpress-l10n packages."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:wordpress");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:wordpress-l10n");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:6.0");
script_set_attribute(attribute:"patch_publication_date", value:"2015/08/19");
script_set_attribute(attribute:"plugin_publication_date", value:"2015/08/20");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2015-2021 Tenable Network Security, Inc.");
script_family(english:"Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"6.0", prefix:"wordpress", reference:"3.6.1+dfsg-1~deb6u7")) flag++;
if (deb_check(release:"6.0", prefix:"wordpress-l10n", reference:"3.6.1+dfsg-1~deb6u7")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo