Debian Security Advisory

DLA-568-1 wordpress -- LTS security update

Date Reported:
29 Jul 2016
Affected Packages:
wordpress
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 828225.
In Mitre's CVE dictionary: CVE-2016-5387, CVE-2016-5832, CVE-2016-5834, CVE-2016-5835, CVE-2016-5838, CVE-2016-5839.
More information:

Several vulnerabilities were discovered in wordpress, a web blogging tool. The Common Vulnerabilities and Exposures project identifies the following issues.

  • CVE-2016-5387

    WordPress allows remote attackers to bypass intended access restrictions and remove a category attribute from a post via unspecified vectors.

  • CVE-2016-5832

    The customizer in WordPress allows remote attackers to bypass intended redirection restrictions via unspecified vectors.

  • CVE-2016-5834

    Cross-site scripting (XSS) vulnerability in the wp_get_attachment_link function in wp-includes/post template.php in WordPress allows remote attackers to inject arbitrary web script or HTML via a crafted attachment name.

  • CVE-2016-5835

    WordPress allows remote attackers to obtain sensitive revision-history information by leveraging the ability to read a post related to wp-admin/includes/ajax-actions.php and wp-admin/revision.php.

  • CVE-2016-5838

    WordPress allows remote attackers to bypass intended password change restrictions by leveraging knowledge of a cookie.

  • CVE-2016-5839

    WordPress allows remote attackers to bypass the sanitize_file_name protection mechanism via unspecified vectors.

For Debian 7 Wheezy, these problems have been fixed in version 3.6.1+dfsg-1~deb7u11.

We recommend that you upgrade your wordpress packages.

Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS