Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 124526

Summary: www-apps/wordpress: cross-site scripting vulns
Product: Gentoo Security Reporter: Stefan Cornelius (RETIRED) <dercorny>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED INVALID    
Severity: minor CC: moixa, ogardiner.23444071, web-apps
Priority: High    
Version: unspecified   
Hardware: All   
OS: Linux   
URL: http://neosecurityteam.net/advisories/Advisory-17.txt
Whiteboard: B4? [upstream] DerCorny
Package list:
Runtime testing required: ---

Description Stefan Cornelius (RETIRED) gentoo-dev 2006-03-01 07:47:42 UTC
<+ Multiple XSS +>
There're multiple XSS in `post comment':

[1] `name' variable is not filtered when it's assigned to `value'
    on the `<input>' in the form when the comment it's posted.
[2] Happends the same as [1] with `website' variable.
[3] `comment', this variable only filtered " and ' chars, this makes 
    possible to use < and >, thus this permit an attacker to inject 
    any HTML (or script) code that he/she want but without any " or ' 
    character, this only happends if the user that post the comment it's 
    the admin (any registered kind of `user').
Comment 1 Stefan Cornelius (RETIRED) gentoo-dev 2006-03-01 07:49:11 UTC
superlag please bump as soon as a fix/new upstream version is available, thanks.
Comment 2 Thierry Carrez (RETIRED) gentoo-dev 2006-03-04 04:20:33 UTC
For [1] and [2] it's not usable for XSS (only affects you)
For [3] it needs to be posted by the admin (or approved by him) so very low risk.

We should probably invalidate it.
Comment 3 Tavis Ormandy (RETIRED) gentoo-dev 2006-03-05 11:30:36 UTC
based on koon's comments, i think we can pass this over to maintainers
Comment 4 Thierry Carrez (RETIRED) gentoo-dev 2006-03-05 13:11:43 UTC
Invalid as a security issue