Security release for WordPress 4.7.2 with three issues fixe
Reporter | Title | Published | Views | Family All 39 |
---|---|---|---|---|
![]() | CVE-2017-5610 | 30 Jan 201704:59 | – | cve |
![]() | CVE-2017-5610 | 30 Jan 201700:00 | – | ubuntucve |
![]() | Design/Logic Flaw | 30 Jan 201704:59 | – | prion |
![]() | CVE-2017-5610 | 30 Jan 201704:59 | – | debiancve |
![]() | Fedora 24 : wordpress (2017-338a3f27e5) | 3 Feb 201700:00 | – | nessus |
![]() | FreeBSD : wordpress -- multiple vulnerabilities (14ea4458-e5cd-11e6-b56d-38d547003487) | 30 Jan 201700:00 | – | nessus |
![]() | WordPress 4.5.x < 4.5.6 Multiple Vulnerabilities | 5 Nov 201800:00 | – | nessus |
![]() | WordPress 4.1.x < 4.1.15 Multiple Vulnerabilities | 5 Nov 201800:00 | – | nessus |
![]() | WordPress 3.9.x < 3.9.16 Multiple Vulnerabilities | 5 Nov 201800:00 | – | nessus |
![]() | WordPress 3.7.x < 3.7.18 Multiple Vulnerabilities | 5 Nov 201800:00 | – | nessus |
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Fedora Security Advisory FEDORA-2017-0be7ce9e72.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(96964);
script_version("3.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2017-5610");
script_xref(name:"FEDORA", value:"2017-0be7ce9e72");
script_name(english:"Fedora 25 : wordpress (2017-0be7ce9e72)");
script_summary(english:"Checks rpm output for the updated package.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Fedora host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"**WordPress 4.7.2 Security Release**
WordPress 4.7.2 is now available. This is a security release for all
previous versions and we strongly encourage you to update your sites
immediately.
WordPress versions 4.7.1 and earlier are affected by three security
issues :
- The user interface for assigning taxonomy terms in Press
This is shown to users who do not have permissions to
use it. Reported by David Herrera of Alley Interactive.
- WP_Query is vulnerable to a SQL injection (SQLi) when
passing unsafe data. WordPress core is not directly
vulnerable to this issue, but we’ve added
hardening to prevent plugins and themes from
accidentally causing a vulnerability. Reported by Mo
Jangda (batmoo).
- A cross-site scripting (XSS) vulnerability was
discovered in the posts list table. Reported by Ian Dunn
of the WordPress Security Team.
Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora update system website.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://bodhi.fedoraproject.org/updates/FEDORA-2017-0be7ce9e72"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected wordpress package."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fedoraproject:fedora:wordpress");
script_set_attribute(attribute:"cpe", value:"cpe:/o:fedoraproject:fedora:25");
script_set_attribute(attribute:"vuln_publication_date", value:"2017/01/30");
script_set_attribute(attribute:"patch_publication_date", value:"2017/02/02");
script_set_attribute(attribute:"plugin_publication_date", value:"2017/02/03");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2017-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Fedora Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Fedora" >!< release) audit(AUDIT_OS_NOT, "Fedora");
os_ver = pregmatch(pattern: "Fedora.*release ([0-9]+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Fedora");
os_ver = os_ver[1];
if (! preg(pattern:"^25([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Fedora 25", "Fedora " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Fedora", cpu);
flag = 0;
if (rpm_check(release:"FC25", reference:"wordpress-4.7.2-1.fc25")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_WARNING,
extra : rpm_report_get()
);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "wordpress");
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo