MGASA-2013-0198

Source
https://advisories.mageia.org/MGASA-2013-0198.html
Import Source
https://advisories.mageia.org/MGASA-2013-0198.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2013-0198
Related
Published
2013-07-01T19:19:24Z
Modified
2013-07-01T19:19:03Z
Summary
Updated wordpress package fixes security vulnerabilities
Details

A denial of service flaw was found in the way Wordpress, a blog tool and publishing platform, performed hash computation when checking password for password protected blog posts. A remote attacker could provide a specially- crafted input that, when processed by the password checking mechanism of Wordpress would lead to excessive CPU consumption (CVE-2013-2173).

Inadequate SSRF protection for HTTP requests where the user can provide a URL can allow for attacks against the intranet and other sites. This is a continuation of work related to CVE-2013-0235, which was specific to SSRF in pingback requests and was fixed in 3.5.1 (CVE-2013-2199).

Inadequate checking of a user's capabilities could allow them to publish posts when their user role should not allow for it; and to assign posts to other authors (CVE-2013-2200).

Inadequate escaping allowed an administrator to trigger a cross-site scripting vulnerability through the uploading of media files and plugins (CVE-2013-2201).

The processing of an oEmbed response is vulnerable to an XXE (CVE-2013-2202).

If the uploads directory is not writable, error message data returned via XHR will include a full path to the directory (CVE-2013-2203).

Content Spoofing in the MoxieCode (TinyMCE) MoxiePlayer project (CVE-2013-2204).

Cross-domain XSS in SWFUpload (CVE-2013-2205).

References
Credits

Affected packages

Mageia:3 / wordpress

Package

Name
wordpress
Purl
pkg:rpm/mageia/wordpress?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.2-1.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:2 / wordpress

Package

Name
wordpress
Purl
pkg:rpm/mageia/wordpress?distro=mageia-2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.2-1.mga2

Ecosystem specific

{
    "section": "core"
}