First published: Fri Jun 21 2013(Updated: )
On Friday, 2013-06-21 WordPress upstream is about to release new WordPress v3.5.2 version, correcting the following security flaws: * <a href="https://access.redhat.com/security/cve/CVE-2013-2199">CVE-2013-2199</a> - SSRF, multiple vulnerabilities: Inadequate SSRF protection for HTTP requests where the user can provide a URL can allow for attacks against the intranet and other sites. This is a continuation of work related to <a href="https://access.redhat.com/security/cve/CVE-2013-0235">CVE-2013-0235</a>, which was specific to SSRF in pingback requests and was fixed in 3.5.1. * <a href="https://access.redhat.com/security/cve/CVE-2013-2200">CVE-2013-2200</a> - Privilege escalation allowing contributors to publish posts: Inadequate checking of a user's capabilities could allow them to publish posts when their user role should not allow for it; and to assign posts to other authors. * <a href="https://access.redhat.com/security/cve/CVE-2013-2201">CVE-2013-2201</a> - XSS, multiple vulnerabilities: Inadequate escaping allowed an administrator to trigger a cross-site scripting vulnerability through the uploading of media files and plugins. * <a href="https://access.redhat.com/security/cve/CVE-2013-2202">CVE-2013-2202</a> - XXE via oEmbed: The processing of an oEmbed response is vulnerable to an XXE. * <a href="https://access.redhat.com/security/cve/CVE-2013-2203">CVE-2013-2203</a> - Full Path Disclosure during File Upload: If the uploads directory is not writable, error message data returned via XHR will include a full path to the directory. And two security flaws in external products: * <a href="https://access.redhat.com/security/cve/CVE-2013-2204">CVE-2013-2204</a> - Content Spoofing in the MoxieCode (TinyMCE) MoxiePlayer project: Upstream patch: <a href="https://github.com/moxiecode/moxieplayer/commit/b61ac518ffa2657e2dc9019b2">https://github.com/moxiecode/moxieplayer/commit/b61ac518ffa2657e2dc9019b2</a> * <a href="https://access.redhat.com/security/cve/CVE-2013-2205">CVE-2013-2205</a> - Cross-domain XSS in SWFUpload (again): Fix: Removing security.allowDomain("*") and only allow access from the same domain.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/WordPress | <3.5.2 | 3.5.2 |
WordPress WordPress | <=3.5.1 | |
WordPress WordPress | =0.71 | |
WordPress WordPress | =1.0 | |
WordPress WordPress | =1.0.1 | |
WordPress WordPress | =1.0.2 | |
WordPress WordPress | =1.1.1 | |
WordPress WordPress | =1.2 | |
WordPress WordPress | =1.2.1 | |
WordPress WordPress | =1.2.2 | |
WordPress WordPress | =1.2.3 | |
WordPress WordPress | =1.2.4 | |
WordPress WordPress | =1.2.5 | |
WordPress WordPress | =1.2.5-a | |
WordPress WordPress | =1.3 | |
WordPress WordPress | =1.3.2 | |
WordPress WordPress | =1.3.3 | |
WordPress WordPress | =1.5 | |
WordPress WordPress | =1.5.1 | |
WordPress WordPress | =1.5.1.1 | |
WordPress WordPress | =1.5.1.2 | |
WordPress WordPress | =1.5.1.3 | |
WordPress WordPress | =1.5.2 | |
WordPress WordPress | =1.6.2 | |
WordPress WordPress | =2.0 | |
WordPress WordPress | =2.0.1 | |
WordPress WordPress | =2.0.2 | |
WordPress WordPress | =2.0.4 | |
WordPress WordPress | =2.0.5 | |
WordPress WordPress | =2.0.6 | |
WordPress WordPress | =2.0.7 | |
WordPress WordPress | =2.0.8 | |
WordPress WordPress | =2.0.9 | |
WordPress WordPress | =2.0.10 | |
WordPress WordPress | =2.0.11 | |
WordPress WordPress | =2.1 | |
WordPress WordPress | =2.1.1 | |
WordPress WordPress | =2.1.2 | |
WordPress WordPress | =2.1.3 | |
WordPress WordPress | =2.2 | |
WordPress WordPress | =2.2.1 | |
WordPress WordPress | =2.2.2 | |
WordPress WordPress | =2.2.3 | |
WordPress WordPress | =2.3 | |
WordPress WordPress | =2.3.1 | |
WordPress WordPress | =2.3.2 | |
WordPress WordPress | =2.3.3 | |
WordPress WordPress | =2.5 | |
WordPress WordPress | =2.5.1 | |
WordPress WordPress | =2.6 | |
WordPress WordPress | =2.6.1 | |
WordPress WordPress | =2.6.2 | |
WordPress WordPress | =2.6.3 | |
WordPress WordPress | =2.6.5 | |
WordPress WordPress | =2.7 | |
WordPress WordPress | =2.7.1 | |
WordPress WordPress | =2.8 | |
WordPress WordPress | =2.8.1 | |
WordPress WordPress | =2.8.2 | |
WordPress WordPress | =2.8.3 | |
WordPress WordPress | =2.8.4 | |
WordPress WordPress | =2.8.4-a | |
WordPress WordPress | =2.8.5 | |
WordPress WordPress | =2.8.5.1 | |
WordPress WordPress | =2.8.5.2 | |
WordPress WordPress | =2.8.6 | |
WordPress WordPress | =2.9 | |
WordPress WordPress | =2.9.1 | |
WordPress WordPress | =2.9.1.1 | |
WordPress WordPress | =2.9.2 | |
WordPress WordPress | =3.3 | |
WordPress WordPress | =3.3.1 | |
WordPress WordPress | =3.3.2 | |
WordPress WordPress | =3.3.3 | |
WordPress WordPress | =3.4.0 | |
WordPress WordPress | =3.4.1 | |
WordPress WordPress | =3.4.2 | |
WordPress WordPress | =3.5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.