|Summary:||www-apps/wordpress PHP Execution and XSS via setup-config.php page (CVE-2011-4899)|
|Product:||Gentoo Security||Reporter:||Michael Harrison <n0idx80>|
|Component:||Vulnerabilities||Assignee:||Gentoo Security <security>|
|Package list:||Runtime testing required:||---|
Description Michael Harrison 2012-01-25 21:26:36 UTC
Comment 1 GLSAMaker/CVETool Bot 2012-11-11 13:47:01 UTC
CVE-2011-4899 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4899): ** DISPUTED ** wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier does not ensure that the specified MySQL database service is appropriate, which allows remote attackers to configure an arbitrary database via the dbhost and dbname parameters, and subsequently conduct static code injection and cross-site scripting (XSS) attacks via (1) an HTTP request or (2) a MySQL query. NOTE: the vendor disputes the significance of this issue; however, remote code execution makes the issue important in many realistic environments.
Comment 2 Samuel Damashek (RETIRED) 2013-12-22 19:21:50 UTC
There's no plan for upstream to release a fix for this issue. What's the view of others on the validity of this bug?
Comment 3 Aaron Bauman 2016-02-21 04:35:51 UTC
The vulnerability is disputed and no signs of fixing it from wordpress source/repos. Package has always been masked due to their constant security vulnerabilities which typically are ignored. GLSA?
Comment 4 Aaron Bauman 2016-02-29 14:13:43 UTC
CVE states only wordpress-3.3.1 and earlier. No vulnerable ebuilds in tree. CVE is disputed as mentioned.