Executive Summary
Informations | |||
---|---|---|---|
Name | MDVSA-2013:239 | First vendor Publication | 2013-09-19 |
Vendor | Mandriva | Last vendor Modification | 2013-09-19 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Updated wordpress and php-phpmailer packages fix security vulnerabilities: wp-includes/functions.php in WordPress before 3.6.1 does not properly determine whether data has been serialized, which allows remote attackers to execute arbitrary code by triggering erroneous PHP unserialize operations (CVE-2013-4338). WordPress before 3.6.1 does not properly validate URLs before use in an HTTP redirect, which allows remote attackers to bypass intended redirection restrictions via a crafted string (CVE-2013-4339). wp-admin/includes/post.php in WordPress before 3.6.1 allows remote authenticated users to spoof the authorship of a post by leveraging the Author role and providing a modified user_ID parameter (CVE-2013-4340). The get_allowed_mime_types function in wp-includes/functions.php in WordPress before 3.6.1 does not require the unfiltered_html capability for uploads of .htm and .html files, which might make it easier for remote authenticated users to conduct cross-site scripting (XSS) attacks via a crafted file (CVE-2013-5738). The default configuration of WordPress before 3.6.1 does not prevent uploads of .swf and .exe files, which might make it easier for remote authenticated users to conduct cross-site scripting (XSS) attacks via a crafted file, related to the get_allowed_mime_types function in wp-includes/functions.php (CVE-2013-5739). Additionally, php-phpmailer has been updated to a newer version required by the updated wordpress. |
Original Source
Url : http://www.mandriva.com/security/advisories?name=MDVSA-2013:239 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
40 % | CWE-20 | Improper Input Validation |
20 % | CWE-264 | Permissions, Privileges, and Access Controls |
20 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
20 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:19772 | |||
Oval ID: | oval:org.mitre.oval:def:19772 | ||
Title: | DSA-2757-1 wordpress - several | ||
Description: | Several vulnerabilities were identified in Wordpress, a web blogging tool. As the CVEs were allocated from releases announcements and specific fixes are usually not identified, it has been decided to upgrade the Wordpress package to the latest upstream version instead of backporting the patches. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2757-1 CVE-2013-4338 CVE-2013-4339 CVE-2013-4340 CVE-2013-5738 CVE-2013-5739 | Version: | 5 |
Platform(s): | Debian GNU/Linux 6.0 Debian GNU/Linux 7 Debian GNU/kFreeBSD 6.0 Debian GNU/kFreeBSD 7 | Product(s): | wordpress |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2013-09-19 | IAVM : 2013-B-0106 - Multiple Vulnerabilities in WordPress Severity : Category I - VMSKEY : V0040374 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-10-20 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_043d3a78f24549389bc73d0d35dd94bf.nasl - Type : ACT_GATHER_INFO |
2013-09-27 | Name : The remote Fedora host is missing a security update. File : fedora_2013-16855.nasl - Type : ACT_GATHER_INFO |
2013-09-27 | Name : The remote Fedora host is missing a security update. File : fedora_2013-16895.nasl - Type : ACT_GATHER_INFO |
2013-09-27 | Name : The remote Fedora host is missing a security update. File : fedora_2013-16925.nasl - Type : ACT_GATHER_INFO |
2013-09-20 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2013-239.nasl - Type : ACT_GATHER_INFO |
2013-09-19 | Name : The remote web server contains a PHP application that is affected by multiple... File : wordpress_3_6_1.nasl - Type : ACT_GATHER_INFO |
2013-09-15 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2757.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:44:02 |
|
2013-09-19 17:18:41 |
|