漏洞信息详情
WordPress 'feed.php'跨站脚本攻击漏洞
漏洞简介
WordPress是一个基于PHP和Mysql开放源码的博客发布平台。
WordPress的RSS Feed Generator (wp-includes/feed.php)中的self_link函数存在跨站脚本攻击漏洞。远程攻击者可以借助Host页眉(HTTP_HOST自变量),注入任意web脚本或HTML。
漏洞公告
目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
WordPress WordPress 2.2
WordPress latest.tar.gz
http://wordpress.org/latest.tar.gz
WordPress WordPress 2.3
WordPress latest.tar.gz
http://wordpress.org/latest.tar.gz
参考网址
来源:wordpress.org
链接:http://wordpress.org/development/2008/11/wordpress-265/
来源: FEDORA
名称: FEDORA-2008-10468
链接:https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00176.html
来源: FEDORA
名称: FEDORA-2008-10483
链接:https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00000.html
来源: XF
名称: wordpress-feed-xss(46882)
链接:http://xforce.iss.net/xforce/xfdb/46882
来源: BID
名称: 32476
链接:http://www.securityfocus.com/bid/32476
来源: BUGTRAQ
名称: 20081125 WordPress XSS vulnerability in RSS Feed Generator
链接:http://www.securityfocus.com/archive/1/498652
来源: SREASON
名称: 4662
链接:http://securityreason.com/securityalert/4662
来源: SECUNIA
名称: 32966
链接:http://secunia.com/advisories/32966
来源: SECUNIA
名称: 32882
链接:http://secunia.com/advisories/32882
来源: OSVDB
名称: 50214
链接:http://osvdb.org/50214
受影响实体
- Wordpress Wordpress:2.0.8<!--2000-1-1-->
- Wordpress Wordpress:2.0.9<!--2000-1-1-->
- Wordpress Wordpress:2.0.3<!--2000-1-1-->
- Wordpress Wordpress:2.0.4<!--2000-1-1-->
- Wordpress Wordpress:2.0.5<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...