Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 605408 - <www-apps/wordpress-4.7.1: Multiple vulnerabilities
Summary: <www-apps/wordpress-4.7.1: Multiple vulnerabilities
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: https://codex.wordpress.org/Version_4...
Whiteboard: ~2 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2017-01-11 20:28 UTC by Thomas Deutschmann (RETIRED)
Modified: 2017-02-01 02:22 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Deutschmann (RETIRED) gentoo-dev 2017-01-11 20:28:37 UTC
WordPress versions 4.7 and earlier are affected by eight security issues:

  - Remote code execution (RCE) in PHPMailer – No specific issue appears
    to affect WordPress or any of the major plugins we investigated but,
    out of an abundance of caution, we updated PHPMailer in this release.
    This issue was reported to PHPMailer by Dawid Golunski and Paul
    Buonopane. (Gentoo bug 603754)

  - The REST API exposed user data for all users who had authored a post
    of a public post type. WordPress 4.7.1 limits this to only post types
    which have specified that they should be shown within the REST API.
    Reported by Krogsgard and Chris Jean.

  - Cross-site scripting (XSS) via the plugin name or version header on
    update-core.php. Reported by Dominik Schilling of the WordPress
    Security Team.

  - Cross-site request forgery (CSRF) bypass via uploading a Flash
    file. Reported by Abdullah Hussam.

  - Cross-site scripting (XSS) via theme name fallback. Reported by
    Mehmet Ince.

  - Post via email checks mail.example.com if default settings aren't
    changed. Reported by John Blackbourn of the WordPress Security
    Team.

  - A cross-site request forgery (CSRF) was discovered in the
    accessibility mode of widget editing. Reported by Ronnie Skansing.

  - Weak cryptographic security for multisite activation key. Reported
    by Jack.

List closed tickets: https://core.trac.wordpress.org/query?status=closed&milestone=4.7.1
Comment 1 Thomas Deutschmann (RETIRED) gentoo-dev 2017-01-11 20:34:02 UTC
Updated package is already in tree via 67671baada119a8d4b6491afd9bfffe8c397f0c2


@ Maintainer(s): Please cleanup and drop <www-apps/wordpress-4.7.1, remove keywords or apply masks indicating a security problem.