[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE Request -- WordPress
From:       "Steven M. Christey" <coley () linus ! mitre ! org>
Date:       2009-08-18 20:45:45
Message-ID: Pine.GSO.4.51.0908181645090.17763 () faron ! mitre ! org
[Download RAW message or body]



On Tue, 21 Jul 2009, Jan Lieskovsky wrote:

>   latest WordPress 2.8.2 version has addressed a XSS vulnerability:
>
>     XSS via unescaped HTML URLs as author comments in the admin page


======================================================
Name: CVE-2009-2851
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2851
Reference: MLIST:[oss-security] 20090721 CVE Request -- WordPress
Reference: URL:http://www.openwall.com/lists/oss-security/2009/07/21/1
Reference: CONFIRM:http://bugs.gentoo.org/show_bug.cgi?id=278492
Reference: CONFIRM:http://wordpress.org/development/2009/07/wordpress-2-8-2/
Reference: CONFIRM:https://bugzilla.redhat.com/show_bug.cgi?id=512900
Reference: FEDORA:FEDORA-2009-8109
Reference: URL:https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01241.html
Reference: FEDORA:FEDORA-2009-8114
Reference: URL:https://www.redhat.com/archives/fedora-package-announce/2009-July/msg01253.html
Reference: SECTRACK:1022589
Reference: URL:http://securitytracker.com/id?1022589

Cross-site scripting (XSS) vulnerability in the administrator
interface in WordPress before 2.8.2 allows remote attackers to inject
arbitrary web script or HTML via a comment author URL.


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic