Lucene search

K
osvGoogleOSV:DLA-568-1
HistoryJul 29, 2016 - 12:00 a.m.

wordpress - security update

2016-07-2900:00:00
Google
osv.dev
16

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

Several vulnerabilities were discovered in wordpress, a web blogging
tool. The Common Vulnerabilities and Exposures project identifies the
following issues.

  • CVE-2016-5387
    WordPress allows remote attackers to bypass intended
    access restrictions and remove a category attribute from a post via
    unspecified vectors.
  • CVE-2016-5832
    The customizer in WordPress allows remote attackers to
    bypass intended redirection restrictions via unspecified vectors.
  • CVE-2016-5834
    Cross-site scripting (XSS) vulnerability in the
    wp_get_attachment_link function in wp-includes/post
    template.php in WordPress allows remote
    attackers to inject arbitrary web script or HTML via a crafted
    attachment name.
  • CVE-2016-5835
    WordPress allows remote attackers to obtain sensitive
    revision-history information by leveraging the ability to read a
    post related to wp-admin/includes/ajax-actions.php and
    wp-admin/revision.php.
  • CVE-2016-5838
    WordPress allows remote attackers to bypass intended password
    change restrictions by leveraging knowledge of a cookie.
  • CVE-2016-5839
    WordPress allows remote attackers to bypass the
    sanitize_file_name protection mechanism via unspecified vectors.

For Debian 7 Wheezy, these problems have been fixed in version
3.6.1+dfsg-1~deb7u11.

We recommend that you upgrade your wordpress packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: <https://wiki.debian.org/LTS&gt;

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

5.1 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P