漏洞信息详情
WordPress "wp-includes/functions.php" 未限制文件上传漏洞
漏洞简介
WordPress 2.8.6之前版本的wp-includes/functions.php文件中的wp_check_filetype函数存在未限制文件上传漏洞。当Apache HTTP服务器中的mod_mime模块的一个特定配置被启用时,远程认证用户可以通过先使用一个拥有多扩展名的文件名,比如.php.jpg文件名,存储一个附件,然后再借助一个对wp-content/uploads/路径名的直接请求来访问它,从而执行任意代码。
漏洞公告
目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
http://sunsolve.sun.com/search/document.do?assetkey=1-66-270475-1
参考网址
来源: MLIST
名称: [oss-security] 20091116 Re: CVE request: Wordpress 2.8.6
链接:http://www.openwall.com/lists/oss-security/2009/11/16/1
来源: MLIST
名称: [oss-security] 20091115 Re: CVE request: Wordpress 2.8.6
链接:http://www.openwall.com/lists/oss-security/2009/11/15/3
来源: MLIST
名称: [oss-security] 20091115 CVE request: Wordpress 2.8.6
链接:http://www.openwall.com/lists/oss-security/2009/11/15/2
来源: wordpress.org
链接:http://wordpress.org/development/2009/11/wordpress-2-8-6-security-release/
来源: OSVDB
名称: 59958
链接:http://www.osvdb.org/59958
来源: SECUNIA
名称: 37332
链接:http://secunia.com/advisories/37332
来源: core.trac.wordpress.org
链接:http://core.trac.wordpress.org/ticket/11122
来源: FULLDISC
名称: 20091112 Re: WordPress
链接:http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0153.html
来源: FULLDISC
名称: 20091112 Re: WordPress
链接:http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0149.html
来源: FULLDISC
名称: 20091111 WordPress
链接:http://archives.neohapsis.com/archives/fulldisclosure/2009-11/0142.html
受影响实体
- Wordpress Wordpress:2.8.5<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...