漏洞信息详情
WordPress "wp-admin/press-this.php" 跨站脚本攻击漏洞
漏洞简介
WordPress 2.8.6之前版本的wp-admin/press-this.php文件中存在跨站脚本攻击漏洞。远程认证用户可以借助s参数(又称选择变量),注入任意的web脚本或HTML。
漏洞公告
目前厂商已经发布了升级补丁以修复这个安全问题,补丁下载链接:
http://sunsolve.sun.com/search/document.do?assetkey=1-66-270475-1
参考网址
来源: MLIST
名称: [oss-security] 20091116 Re: CVE request: Wordpress 2.8.6
链接:http://www.openwall.com/lists/oss-security/2009/11/16/1
来源: MLIST
名称: [oss-security] 20091115 Re: CVE request: Wordpress 2.8.6
链接:http://www.openwall.com/lists/oss-security/2009/11/15/3
来源: MLIST
名称: [oss-security] 20091115 CVE request: Wordpress 2.8.6
链接:http://www.openwall.com/lists/oss-security/2009/11/15/2
来源: wordpress.org
链接:http://wordpress.org/development/2009/11/wordpress-2-8-6-security-release/
来源: core.trac.wordpress.org
链接:http://core.trac.wordpress.org/attachment/ticket/11119/press-this.002.diff
来源: core.trac.wordpress.org
链接:http://core.trac.wordpress.org/attachment/ticket/11119/press-this-xss-bug-11-10-2009.patch
来源: OSVDB
名称: 59959
链接:http://www.osvdb.org/59959
来源: SECUNIA
名称: 37332
链接:http://secunia.com/advisories/37332
来源: core.trac.wordpress.org
链接:http://core.trac.wordpress.org/ticket/11119
受影响实体
- Wordpress Wordpress:2.8.5<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...