Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | |||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.891980 |
Kategorie: | Debian Local Security Checks |
Titel: | Debian LTS: Security Advisory for wordpress (DLA-1980-1) |
Zusammenfassung: | The remote host is missing an update for the 'wordpress'; package(s) announced via the DLA-1980-1 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'wordpress' package(s) announced via the DLA-1980-1 advisory. Vulnerability Insight: Several vulnerabilities in wordpress, a web blogging tool, have been fixed. CVE-2019-17669 Server Side Request Forgery (SSRF) vulnerability because URL validation does not consider the interpretation of a name as a series of hex characters. CVE-2019-17670 Server Side Request Forgery (SSRF) vulnerability was reported in wp_validate_redirect(). Normalize the path when validating the location for relative URLs. CVE-2019-17671 Unauthenticated viewing of certain content (private or draft posts) is possible because the static query property is mishandled. CVE-2019-17675 Wordpress does not properly consider type confusion during validation of the referer in the admin pages. This vulnerability affects the check_admin_referer() WordPress function. Affected Software/OS: 'wordpress' package(s) on Debian Linux. Solution: For Debian 8 'Jessie', these problems have been fixed in version 4.1.28+dfsg-0+deb8u1. We recommend that you upgrade your wordpress packages. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2019-17669 Common Vulnerability Exposure (CVE) ID: CVE-2019-17670 Common Vulnerability Exposure (CVE) ID: CVE-2019-17671 Common Vulnerability Exposure (CVE) ID: CVE-2019-17675 |
Copyright | Copyright (C) 2019 Greenbone Networks GmbH |
Dies ist nur einer von 99761 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |