Two XSS bugs and one potential information disclosure issue were discovered in WordPress, a weblog manager. The Common Vulnerabilities and Exposures project identifies the following problems :
CVE-2011-0700 Input passed via the post title when performing a ‘Quick Edit’ or’Bulk Edit’ action and via the ‘post_status’, ‘comment_status’, and ‘ping_status’ parameters is not properly sanitised before being used. Certain input passed via tags in the tags meta-box is not properly sanitised before being returned to the user.
CVE-2011-0701 WordPress incorrectly enforces user access restrictions when accessing posts via the media uploader and can be exploited to disclose the contents of e.g. private or draft posts.
The oldstable distribution (lenny) is not affected by these problems.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DSA-2190. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(52637);
script_version("1.14");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/04");
script_cve_id("CVE-2011-0700", "CVE-2011-0701");
script_bugtraq_id(46249);
script_xref(name:"DSA", value:"2190");
script_name(english:"Debian DSA-2190-1 : wordpress - several vulnerabilities");
script_summary(english:"Checks dpkg output for the updated package");
script_set_attribute(
attribute:"synopsis",
value:"The remote Debian host is missing a security-related update."
);
script_set_attribute(
attribute:"description",
value:
"Two XSS bugs and one potential information disclosure issue were
discovered in WordPress, a weblog manager. The Common Vulnerabilities
and Exposures project identifies the following problems :
- CVE-2011-0700
Input passed via the post title when performing a 'Quick
Edit' or'Bulk Edit' action and via the 'post_status',
'comment_status', and 'ping_status' parameters is not
properly sanitised before being used. Certain input
passed via tags in the tags meta-box is not properly
sanitised before being returned to the user.
- CVE-2011-0701
WordPress incorrectly enforces user access restrictions
when accessing posts via the media uploader and can be
exploited to disclose the contents of e.g. private or
draft posts.
The oldstable distribution (lenny) is not affected by these problems."
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2011-0700"
);
script_set_attribute(
attribute:"see_also",
value:"https://security-tracker.debian.org/tracker/CVE-2011-0701"
);
script_set_attribute(
attribute:"see_also",
value:"https://packages.debian.org/source/squeeze/wordpress"
);
script_set_attribute(
attribute:"see_also",
value:"https://www.debian.org/security/2011/dsa-2190"
);
script_set_attribute(
attribute:"solution",
value:
"Upgrade the wordpress packages.
For the stable distribution (squeeze), these problems have been fixed
in version 3.0.5+dfsg-0+squeeze1."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:wordpress");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:6.0");
script_set_attribute(attribute:"patch_publication_date", value:"2011/03/11");
script_set_attribute(attribute:"plugin_publication_date", value:"2011/03/14");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2011-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"6.0", prefix:"wordpress", reference:"3.0.5+dfsg-0+squeeze1")) flag++;
if (deb_check(release:"6.0", prefix:"wordpress-l10n", reference:"3.0.5+dfsg-0+squeeze1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Vendor | Product | Version | CPE |
---|---|---|---|
debian | debian_linux | wordpress | p-cpe:/a:debian:debian_linux:wordpress |
debian | debian_linux | 6.0 | cpe:/o:debian:debian_linux:6.0 |