Anfälligkeitssuche        Suche in 219043 CVE Beschreibungen
und 99761 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.891980
Kategorie:Debian Local Security Checks
Titel:Debian LTS: Security Advisory for wordpress (DLA-1980-1)
Zusammenfassung:The remote host is missing an update for the 'wordpress'; package(s) announced via the DLA-1980-1 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'wordpress'
package(s) announced via the DLA-1980-1 advisory.

Vulnerability Insight:
Several vulnerabilities in wordpress, a web blogging tool, have been
fixed.

CVE-2019-17669

Server Side Request Forgery (SSRF) vulnerability because URL
validation does not consider the interpretation of a name as a
series of hex characters.

CVE-2019-17670

Server Side Request Forgery (SSRF) vulnerability was reported in
wp_validate_redirect(). Normalize the path when validating the
location for relative URLs.

CVE-2019-17671

Unauthenticated viewing of certain content (private or draft posts)
is possible because the static query property is mishandled.

CVE-2019-17675

Wordpress does not properly consider type confusion during
validation of the referer in the admin pages. This vulnerability
affects the check_admin_referer() WordPress function.

Affected Software/OS:
'wordpress' package(s) on Debian Linux.

Solution:
For Debian 8 'Jessie', these problems have been fixed in version
4.1.28+dfsg-0+deb8u1.

We recommend that you upgrade your wordpress packages.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2019-17669
Common Vulnerability Exposure (CVE) ID: CVE-2019-17670
Common Vulnerability Exposure (CVE) ID: CVE-2019-17671
Common Vulnerability Exposure (CVE) ID: CVE-2019-17675
CopyrightCopyright (C) 2019 Greenbone Networks GmbH

Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2024 E-Soft Inc. Alle Rechte vorbehalten.