Debian Security Advisory
DLA-568-1 wordpress -- LTS security update
- Date Reported:
- 29 Jul 2016
- Affected Packages:
- wordpress
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 828225.
In Mitre's CVE dictionary: CVE-2016-5387, CVE-2016-5832, CVE-2016-5834, CVE-2016-5835, CVE-2016-5838, CVE-2016-5839. - More information:
-
Several vulnerabilities were discovered in wordpress, a web blogging tool. The Common Vulnerabilities and Exposures project identifies the following issues.
- CVE-2016-5387
WordPress allows remote attackers to bypass intended access restrictions and remove a category attribute from a post via unspecified vectors.
- CVE-2016-5832
The customizer in WordPress allows remote attackers to bypass intended redirection restrictions via unspecified vectors.
- CVE-2016-5834
Cross-site scripting (XSS) vulnerability in the wp_get_attachment_link function in wp-includes/post template.php in WordPress allows remote attackers to inject arbitrary web script or HTML via a crafted attachment name.
- CVE-2016-5835
WordPress allows remote attackers to obtain sensitive revision-history information by leveraging the ability to read a post related to wp-admin/includes/ajax-actions.php and wp-admin/revision.php.
- CVE-2016-5838
WordPress allows remote attackers to bypass intended password change restrictions by leveraging knowledge of a cookie.
- CVE-2016-5839
WordPress allows remote attackers to bypass the sanitize_file_name protection mechanism via unspecified vectors.
For Debian 7
Wheezy
, these problems have been fixed in version 3.6.1+dfsg-1~deb7u11.We recommend that you upgrade your wordpress packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS
- CVE-2016-5387