Summary: | www-apps/wordpress PHP Execution and XSS via setup-config.php page (CVE-2011-4899) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Michael Harrison <n0idx80> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED OBSOLETE | ||
Severity: | minor | CC: | web-apps |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://www.trustwave.com/spiderlabs/advisories/TWSL2012-002.txt | ||
Whiteboard: | B3 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
Michael Harrison
2012-01-25 21:26:36 UTC
CVE-2011-4899 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4899): ** DISPUTED ** wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier does not ensure that the specified MySQL database service is appropriate, which allows remote attackers to configure an arbitrary database via the dbhost and dbname parameters, and subsequently conduct static code injection and cross-site scripting (XSS) attacks via (1) an HTTP request or (2) a MySQL query. NOTE: the vendor disputes the significance of this issue; however, remote code execution makes the issue important in many realistic environments. There's no plan for upstream to release a fix for this issue. What's the view of others on the validity of this bug? The vulnerability is disputed and no signs of fixing it from wordpress source/repos. Package has always been masked due to their constant security vulnerabilities which typically are ignored. GLSA? CVE states only wordpress-3.3.1 and earlier. No vulnerable ebuilds in tree. CVE is disputed as mentioned. |