Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.64.0911151042480.14563@forced.attrition.org>
Date: Sun, 15 Nov 2009 10:43:23 +0000 (UTC)
From: security curmudgeon <jericho@...rition.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: Wordpress 2.8.6


On Sun, 15 Nov 2009, Alex Legler wrote:

: Wordpress released an update, fixing 2 issues:
: 
: "2.8.6 fixes two security problems that can be exploited by registered, 
: logged in users who have posting privileges.  If you have untrusted 
: authors on your blog, upgrading to 2.8.6 is recommended.
: 
: The first problem is an XSS vulnerability in Press This discovered by 
: Benjamin Flesch.  The second problem, discovered by Dawid Golunski, is 
: an issue with sanitizing uploaded file names that can be exploited in 
: certain Apache configurations. Thanks to Benjamin and Dawid for finding 
: and reporting these."
: 
: from
: http://wordpress.org/development/2009/11/wordpress-2-8-6-security-release/
: 
: I believe these are the matching tickets:
: Issue 1: http://core.trac.wordpress.org/ticket/11119
: Issue 2: http://core.trac.wordpress.org/ticket/11122

OSVDB   Disclosure              Title

59958 	2009-11-12 		WordPress /wp-includes/functions.php wp_check_filetype() Function File Upload Arbitrary Code Execution 

59959 	2009-11-12 		WordPress press-this.php Unspecified XSS

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.