SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Forum/Board/Portal)  >   WordPress Vendors:   wordpress.org
WordPress Bugs Let Remote Authenticated Users Gain Elevated Privileges, Remote Users Execute Arbitrary Code, and Remote Users Conduct Redirect Attacks
SecurityTracker Alert ID:  1029025
SecurityTracker URL:  http://securitytracker.com/id/1029025
CVE Reference:   CVE-2013-4338, CVE-2013-4339, CVE-2013-4340, CVE-2013-5738, CVE-2013-5739   (Links to External Site)
Updated:  Sep 19 2013
Original Entry Date:  Sep 11 2013
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 3.6.1
Description:   Several vulnerabilities were reported in WordPress. A remote user can execute arbitrary code on the target system in certain situations. A remote authenticated user can gain elevated privileges. A remote user can redirect a target user to another web site. A remote user can conduct cross-site scripting attacks.

A remote user can send specially crafted data to trigger a PHP deserialization error and potentially execute arbitrary code [CVE-2013-4338]. Tom Van Goethem reported this vulnerability.

A remote authenticated user with the 'Author' role can send a specially crafted request to create a post authored by another user [CVE-2013-4340]. Anakorn Kyavatanakij reported this vulnerability.

A remote user can exploit an open redirect flaw to cause the target user to be redirected to another web site [CVE-2013-4339]. Dave Cummo, a Northrup Grumman subcontractor for the U.S. Centers for Disease Control and Prevention, reported this vulnerability.

The get_allowed_mime_types() function in 'wp-includes/functions.php' does not require the unfiltered_html capability for uploads of '.htm' and '.html' files, which may facilitate cross-site scripting attacks [CVE-2013-5738].

The default configuration does not prevent uploads of '.swf' and '.exe' files, which may facilitate cross-site scripting attacks [CVE-2013-5739].

Impact:   A remote user can execute arbitrary code on the target system.

A remote authenticated user can create a post authored by another user.

A remote user can redirect a target user to another web site.

A remote user can conduct cross-site scripting attacks.

Solution:   The vendor has issued a fix (3.6.1).

The vendor's advisory is available at:

http://codex.wordpress.org/Version_3.6.1

Vendor URL:  codex.wordpress.org/Version_3.6.1 (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, SecurityGlobal.net LLC