漏洞信息详情
WordPress 代码注入漏洞
漏洞简介
WordPress是WordPress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。
WordPress 4.9.9之前版本和5.0.1之前的5.x版本中存在安全漏洞。远程攻击者可通过上传包含有PHP代码的特制图像利用该漏洞执行任意代码。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:
http://www.wordpress.org/
参考网址
来源:DEBIAN
链接:https://www.debian.org/security/2019/dsa-4401
来源:blog.ripstech.com
链接:https://blog.ripstech.com/2019/wordpress-image-remote-code-execution/
来源:EXPLOIT-DB
链接:https://www.exploit-db.com/exploits/46662/
来源:EXPLOIT-DB
链接:https://www.exploit-db.com/exploits/46511/
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/03/msg00044.html
来源:BID
链接:http://www.securityfocus.com/bid/107088
来源:MISC
链接:https://packetstormsecurity.com/files/152396/WordPress-5.0.0-crop-image-Shell-Upload.html
来源:MISC
链接:http://packetstormsecurity.com/files/152396/WordPress-5.0.0-crop-image-Shell-Upload.html
来源:BID
链接:https://www.securityfocus.com/bid/107088
来源:MISC
链接:https://wpvulndb.com/vulnerabilities/9222
来源:http
链接:http/wp_crop_rce
来源:MISC
链接:http://www.rapid7.com/db/modules/exploit/multi/
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2019/03/msg00044.html
来源:www.debian.org
链接:http://www.debian.org/security/2019/dsa-4401
来源:www.nsfocus.net
链接:http://www.nsfocus.net/vulndb/43680
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/78122
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/151924/Debian-Security-Advisory-4401-1.html
来源:www.securityfocus.com
链接:http://www.securityfocus.com/bid/107088
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/76374
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-8942
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/WordPress-Core-code-execution-via-wp-attached-file-28560
来源:www.exploit-db.com
链接:https://www.exploit-db.com/exploits/46511
受影响实体
暂无
补丁
- WordPress 安全漏洞的修复措施<!--2019-2-19-->
还没有评论,来说两句吧...