Git-Url: http://git.frugalware.org/gitweb/gitweb.cgi?p=homepage-ng.git;a=commitdiff;h=4d6d0500dc1cdda01d5283975c772fd801c9c8c8
commit 4d6d0500dc1cdda01d5283975c772fd801c9c8c8 Author: Miklos Vajna <[email protected]> Date: Mon Mar 1 20:43:11 2010 +0100 FSA633-wordpress diff --git a/frugalware/xml/security.xml b/frugalware/xml/security.xml index ef31e9c..f94c997 100644 --- a/frugalware/xml/security.xml +++ b/frugalware/xml/security.xml @@ -26,6 +26,21 @@ <fsas> <fsa> + <id>633</id> + <date>2010-03-01</date> + <author>Miklos Vajna</author> + <package>wordpress</package> + <vulnerable>2.8.5-1getorin1</vulnerable> + <unaffected>2.8.6-1getorin1</unaffected> + <bts>http://bugs.frugalware.org/task/4043</bts> + <cve>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3890 + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3891</cve> + <desc>A security issue and a vulnerability have been reported in WordPress, which can be exploited by malicious users to conduct script insertion attacks and compromise a vulnerable system. + 1) The security issue is caused due to the wp_check_filetype() function in /wp-includes/functions.php improperly validating uploaded files. This can be exploited to execute arbitrary PHP code by uploading a malicious PHP script with multiple extensions. + Successful exploitation of this vulnerability requires that Apache is not configured to handle the mime-type for media files with an e.g. "gif", "jpg", "png", "tif", "wmv" extension. + 2) Input passed via certain parameters to press-this.php is not properly sanitised before being displayed to the user. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is being viewed.</desc> + </fsa> + <fsa> <id>632</id> <date>2010-03-01</date> <author>Miklos Vajna</author> _______________________________________________ Frugalware-git mailing list [email protected] http://frugalware.org/mailman/listinfo/frugalware-git
