Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1721505702.99771258406687618.JavaMail.root@zmail01.collab.prod.int.phx2.redhat.com>
Date: Mon, 16 Nov 2009 16:24:47 -0500 (EST)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: Wordpress 2.8.6

Let's use these:

CVE-2009-3890 wordpress OSVDB 59958
CVE-2009-3891 wordpress OSVDB 59959

Thanks.

-- 
    JB

----- "security curmudgeon" <jericho@...rition.org> wrote:

> On Sun, 15 Nov 2009, Alex Legler wrote:
> 
> : Wordpress released an update, fixing 2 issues:
> : 
> : "2.8.6 fixes two security problems that can be exploited by
> registered, 
> : logged in users who have posting privileges.  If you have untrusted
> 
> : authors on your blog, upgrading to 2.8.6 is recommended.
> : 
> : The first problem is an XSS vulnerability in Press This discovered
> by 
> : Benjamin Flesch.  The second problem, discovered by Dawid Golunski,
> is 
> : an issue with sanitizing uploaded file names that can be exploited
> in 
> : certain Apache configurations. Thanks to Benjamin and Dawid for
> finding 
> : and reporting these."
> : 
> : from
> :
> http://wordpress.org/development/2009/11/wordpress-2-8-6-security-release/
> : 
> : I believe these are the matching tickets:
> : Issue 1: http://core.trac.wordpress.org/ticket/11119
> : Issue 2: http://core.trac.wordpress.org/ticket/11122
> 
> OSVDB   Disclosure              Title
> 
> 59958 	2009-11-12 		WordPress /wp-includes/functions.php
> wp_check_filetype() Function File Upload Arbitrary Code Execution 
> 
> 59959 	2009-11-12 		WordPress press-this.php Unspecified XSS

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.