SB2014012107 - Multiple vulnerabilities in WordPress
Published: January 21, 2014 Updated: November 2, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2010-5293)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
wp-includes/comment.php in WordPress before 3.0.2 does not properly whitelist trackbacks and pingbacks in the blogroll, which allows remote attackers to bypass intended spam restrictions via a crafted URL, as demonstrated by a URL that triggers a substring match.
2) Cross-site scripting (CVE-ID: CVE-2010-5294)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
Multiple cross-site scripting (XSS) vulnerabilities in the request_filesystem_credentials function in wp-admin/includes/file.php in WordPress before 3.0.2 allow remote servers to inject arbitrary web script or HTML by providing a crafted error message for a (1) FTP or (2) SSH connection attempt.
3) Cross-site scripting (CVE-ID: CVE-2010-5295)
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in wp-admin/plugins.php in WordPress before 3.0.2. A remote authenticated attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2010-5296)
The vulnerability allows a remote #AU# to read and manipulate data.
wp-includes/capabilities.php in WordPress before 3.0.2, when a Multisite configuration is used, does not require the Super Admin role for the delete_users capability, which allows remote authenticated administrators to bypass intended access restrictions via a delete action.
Remediation
Install update from vendor's website.