Lucene search

K
openvasCopyright (C) 2019 Greenbone AGOPENVAS:1361412562310112639
HistorySep 09, 2019 - 12:00 a.m.

WordPress Multiple Vulnerabilities (Sep 2019) - Windows

2019-09-0900:00:00
Copyright (C) 2019 Greenbone AG
plugins.openvas.org
46

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.3

Confidence

High

EPSS

0.032

Percentile

91.4%

WordPress is prone to multiple vulnerabilities.

# SPDX-FileCopyrightText: 2019 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:wordpress:wordpress";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.112639");
  script_version("2024-02-08T14:36:53+0000");
  script_tag(name:"last_modification", value:"2024-02-08 14:36:53 +0000 (Thu, 08 Feb 2024)");
  script_tag(name:"creation_date", value:"2019-09-09 08:20:00 +0000 (Mon, 09 Sep 2019)");
  script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:N");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2019-09-12 04:15:00 +0000 (Thu, 12 Sep 2019)");

  script_cve_id("CVE-2019-16217", "CVE-2019-16218", "CVE-2019-16219", "CVE-2019-16220", "CVE-2019-16221",
                "CVE-2019-16222", "CVE-2019-16223");

  script_name("WordPress Multiple Vulnerabilities (Sep 2019) - Windows");

  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2019 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("gb_wordpress_http_detect.nasl", "os_detection.nasl");
  script_mandatory_keys("wordpress/detected", "Host/runs_windows");

  script_tag(name:"qod_type", value:"remote_banner");
  script_tag(name:"solution_type", value:"VendorFix");

  script_tag(name:"summary", value:"WordPress is prone to multiple vulnerabilities.");

  script_tag(name:"insight", value:"The following vulnerabilities exist:

  - a cross-site scripting (XSS) vulnerability found in post previews by contributors and a cross-site scripting vulnerability in stored comments

  - an issue where validation and sanitization of a URL could lead to an open redirect

  - reflected cross-site scripting during media uploads

  - a vulnerability for cross-site scripting (XSS) in shortcode previews

  - a case where reflected cross-site scripting could be found in the dashboard

  - an issue with URL sanitization that can lead to cross-site scripting (XSS) attacks.");

  script_tag(name:"affected", value:"WordPress 5.2.x before 5.2.3, 5.1.x before 5.1.2, 5.0.x before 5.0.6, 4.9.x before 4.9.11, 4.8.x before 4.8.10,
  4.7.x before 4.7.14, 4.6.x before 4.6.15, 4.5.x before 4.5.18, 4.4.x before 4.4.19, 4.3.x before 4.3.20, 4.2.x before 4.2.24, 4.1.x before 4.1.27,
  4.0.x before 4.0.27, 3.9.x before 3.9.28, 3.8.x before 3.8.30 and all previous versions before 3.7.30.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"solution", value:"Update to 5.2.3, 5.1.2, 5.0.6, 4.9.11, 4.8.10, 4.7.14, 4.6.15, 4.5.18, 4.4.19, 4.3.20, 4.2.24,
  4.1.27, 4.0.27, 3.9.28, 3.8.30 or 3.7.30 respectively.");

  script_xref(name:"URL", value:"https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if( ! port = get_app_port( cpe:CPE ) )
  exit( 0 );

if( ! infos = get_app_version_and_location( cpe:CPE, port:port, exit_no_version:TRUE ) )
  exit( 0 );

vers = infos['version'];
path = infos['location'];

if( vers =~ "^5\.2\." && version_is_less( version:vers, test_version:"5.2.3" ) )
  fix = "5.2.3";

else if( vers =~ "^5\.1\." && version_is_less( version:vers, test_version:"5.1.2" ) )
  fix = "5.1.2";

else if( vers =~ "^5\.0\." && version_is_less( version:vers, test_version:"5.0.6" ) )
  fix = "5.0.6";

else if( vers =~ "^4\.9\." && version_is_less( version:vers, test_version:"4.9.11" ) )
  fix = "4.9.11";

else if( vers =~ "^4\.8\." && version_is_less( version:vers, test_version:"4.8.10" ) )
  fix = "4.8.10";

else if( vers =~ "^4\.7\." && version_is_less( version:vers, test_version:"4.7.14" ) )
  fix = "4.7.14";

else if( vers =~ "^4\.6\." && version_is_less( version:vers, test_version:"4.6.15" ) )
  fix = "4.6.15";

else if( vers =~ "^4\.5\." && version_is_less( version:vers, test_version:"4.5.18" ) )
  fix = "4.5.18";

else if( vers =~ "^4\.4\." && version_is_less( version:vers, test_version:"4.4.19" ) )
  fix = "4.4.19";

else if( vers =~ "^4\.3\." && version_is_less( version:vers, test_version:"4.3.20" ) )
  fix = "4.3.20";

else if( vers =~ "^4\.2\." && version_is_less( version:vers, test_version:"4.2.24" ) )
  fix = "4.2.24";

else if( vers =~ "^4\.1\." && version_is_less( version:vers, test_version:"4.1.27" ) )
  fix = "4.1.27";

else if( vers =~ "^4\.0\." && version_is_less( version:vers, test_version:"4.0.27" ) )
  fix = "4.0.27";

else if( vers =~ "^3\.9\." && version_is_less( version:vers, test_version:"3.9.28" ) )
  fix = "3.9.28";

else if( vers =~ "^3\.8\." && version_is_less( version:vers, test_version:"3.8.30" ) )
  fix = "3.8.30";

else if( version_is_less( version:vers, test_version:"3.7.30" ) )
  fix = "3.7.30";

if( fix ) {
  report = report_fixed_ver( installed_version:vers, fixed_version:fix, install_path:path );
  security_message( port:port, data:report);
  exit( 0 );
}

exit( 99 );

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

AI Score

6.3

Confidence

High

EPSS

0.032

Percentile

91.4%