漏洞信息详情
WordPress 跨站请求伪造漏洞
漏洞简介
WordPress是WordPress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。
WordPress 5.5.2之前版本存在跨站请求伪造漏洞,该漏洞可通过CSRF攻击来更改主题的背景图像。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://support.f5.com/csp/article/K75111593
参考网址
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/VUXVUAKL2HL4QYJEPHBNVQQWRMFMII2Y/
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/VAVVYJKA2I6CRQUINECDPBGWMQDEG244/
来源:MISC
链接:https://blog.wpscan.com/2020/10/30/wordpress-5.5.2-security-release.html
来源:DEBIAN
链接:https://www.debian.org/security/2020/dsa-4784
来源:MISC
链接:https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2020/11/msg00004.html
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/CHHVNK2WYAM3ZTCXTFSEIT56IKLVJHU3/
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2020-28040
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3789/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3938/
受影响实体
暂无
补丁
- WordPress 跨站请求伪造漏洞的修复措施<!--2020-11-2-->
还没有评论,来说两句吧...