Package: wordpress
Version: 2.0.5-0.1
Severity: normal

Technical Description

A vulnerability has been identified in WordPress, which could be exploited by 
attackers to execute arbitrary scripting code. This issue is due to an input 
validation error in the "get_file_description()" function when called via the 
"wp-admin/templates.php" script, which could be exploited by attackers to cause 
arbitrary scripting code to be executed by the user's browser in the security 
context of an affected Web site.


Affected Products

WordPress version 2.0.5 and prior


Solution

A fix is available via CVS :
http://trac.wordpress.org/changeset/4665


References

http://www.frsirt.com/english/advisories/2006/5191
http://michaeldaw.org/md-hacks/wordpress-persistent-xss/


-- System Information:
Debian Release: 4.0
  APT prefers testing
  APT policy: (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-686
Locale: LANG=es_ES.utf8, [EMAIL PROTECTED] (charmap=ISO-8859-15)

Versions of packages wordpress depends on:
ii  apache2                       2.2.3-3.2  Next generation, scalable, extenda
ii  apache2-mpm-prefork [httpd]   2.2.3-3.2  Traditional model for Apache HTTPD
ii  mysql-client-5.0 [virtual-mys 5.0.30-1   mysql database client binaries
ii  php5                          5.2.0-8    server-side, HTML-embedded scripti
ii  php5-mysql                    5.2.0-8    MySQL module for php5

wordpress recommends no packages.

-- no debconf information


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to