Git-Url: 
http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=991df07addff7c7855dc2072e36fa1693bf68e39

commit 991df07addff7c7855dc2072e36fa1693bf68e39
Author: voroskoi <[EMAIL PROTECTED]>
Date:   Tue Jan 15 19:48:46 2008 +0100

FSA342-wordpress

diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml
index 9c4c370..80617d6 100644
--- a/frugalware/xml/security.xml
+++ b/frugalware/xml/security.xml
@@ -27,6 +27,20 @@

<fsas>
<fsa>
+               <id>342</id>
+               <date>2008-01-15</date>
+               <author>voroskoi</author>
+               <package>wordpress</package>
+               <vulnerable>2.3.1-1sayshell1</vulnerable>
+               <unaffected>2.3.2-1terminus1</unaffected>
+               <bts>http://bugs.frugalware.org/task/2646</bts>
+               <cve>There is no CVE entry for this issue.</cve>
+               <desc>Some vulnerabilities and a security issue have been 
reported in WordPress, which can be exploited by malicious users to disclose 
potentially sensitive information and by malicious people to bypass certain 
security restrictions and to disclose sensitive or system information.
+                       1) The application does not properly restrict access to 
posted drafts to users with valid administrator credentials. This can be 
exploited to read drafts by accessing the index.php script with data in the 
"PATH_INFO" URL part ending with "wp-admin/".
+                       2) The XMLRPC function "metaWeblog.getRecentPosts" does 
not correctly verify that users have edit rights for a post before disclosing 
the "post_password".
+                       3) A security issue is caused due to certain database 
error messages containing system information (e.g. table names).</desc>
+       </fsa>
+       <fsa>
<id>341</id>
<date>2008-01-15</date>
<author>voroskoi</author>
_______________________________________________
Frugalware-git mailing list
[email protected]
http://frugalware.org/mailman/listinfo/frugalware-git

Reply via email to