|Category:||Debian Local Security Checks|
|Title:||Debian LTS: Security Advisory for wordpress (DLA-2371-1)|
|Summary:||The remote host is missing an update for the 'wordpress'; package(s) announced via the DLA-2371-1 advisory.|
The remote host is missing an update for the 'wordpress'
package(s) announced via the DLA-2371-1 advisory.
Multiple vulnerabilities were discovered in Wordpress, a popular
content management framework.
WordPress has a Server Side Request Forgery (SSRF) vulnerability
because Windows paths are mishandled during certain validation of
Authenticated users with upload permissions (like authors) are
a certain way. This can lead to script execution in the context of
a higher privileged user when the file is viewed by them.
Due to an issue in wp_validate_redirect() and URL sanitization, an
arbitrary external link can be crafted leading to unintended/open
redirect when clicked.
When uploading themes, the name of the theme folder can be crafted
the themes page.
Misuse of the `set-screen-option` filter's return value allows
arbitrary user meta fields to be saved. It does require an admin
to install a plugin that would misuse the filter. Once installed,
it can be leveraged by low privileged users.
Additionally, this upload ensures latest comments can only be viewed
from public posts, and fixes back the user activation procedure.
'wordpress' package(s) on Debian Linux.
For Debian 9 stretch, these problems have been fixed in version
We recommend that you upgrade your wordpress packages.
Common Vulnerability Exposure (CVE) ID: CVE-2020-4047|
Debian Security Information: DSA-4709 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2020-4048
Common Vulnerability Exposure (CVE) ID: CVE-2020-4049
Common Vulnerability Exposure (CVE) ID: CVE-2020-4050
|Copyright||Copyright (C) 2020 Greenbone Networks GmbH|
|This is only one of 85075 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.