CVE编号
CVE-2017-1001000利用情况
暂无补丁情况
N/A披露时间
2017-04-03漏洞描述
The register_routes function in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in the REST API in WordPress 4.7.x before 4.7.2 does not require an integer identifier, which allows remote attackers to modify arbitrary pages via a request for wp-json/wp/v2/posts followed by a numeric value and a non-numeric value, as demonstrated by the wp-json/wp/v2/posts/123?id=123helloworld URI.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://www.openwall.com/lists/oss-security/2017/02/10/16 | |
http://www.securitytracker.com/id/1037731 | |
https://blog.sucuri.net/2017/02/content-injection-vulnerability-wordpress-res... | |
https://blogs.akamai.com/2017/02/wordpress-web-api-vulnerability.html | |
https://codex.wordpress.org/Version_4.7.2 | |
https://gist.github.com/leonjza/2244eb15510a0687ed93160c623762ab | |
https://github.com/WordPress/WordPress/commit/e357195ce303017d517aff944644a7a... | |
https://make.wordpress.org/core/2017/02/01/disclosure-of-additional-security-... | |
https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/ |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | wordpress | wordpress | 4.7 | - | |||||
运行在以下环境 | |||||||||
应用 | wordpress | wordpress | 4.7.1 | - | |||||
运行在以下环境 | |||||||||
应用 | wordpress | wordpress | 4.7.2 | - | |||||
运行在以下环境 | |||||||||
系统 | debian | DPKG | * |
Up to (excluding) 4.7.2+dfsg-1 |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 无
- 保密性 无
- 完整性 高
还没有评论,来说两句吧...