Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAH_aqbsuV0x33AeTUZH=nXt=79z-HsLO3M5=JQkZoT+s3k33Fg@mail.gmail.com>
Date: Sun, 20 Jan 2013 18:18:13 -0200
From: Henrique <typoon@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE Request - Wordpress 3.5 Full-path disclosure vulnerability

Hello,

This is a request for a CVE for an issue with Wordpress 3.5 (and probably
earlier versions) that allows a full-path disclosure.
The issue can be reproduced by accessing the URL as follows:

http://wordpress_site/?s[]=1

producing the error:

Warning: stripslashes() expects parameter 1 to be string, array given in
/home/gilgamesh/security/wpress/wp-includes/query.php on line 2184

Before sanitizing the input, the variables passed should be validated that
they have the correct type in order to avoid such issues.

The wordpress team has already been notified and say they will look into
the code to improve it.

Regards,

Henrique

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.