GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Fri Jun 09, 2006 10:26 pm Post subject: [ GLSA 200606-08 ] WordPress: Arbitrary command execution |
|
|
Gentoo Linux Security Advisory
Title: WordPress: Arbitrary command execution (GLSA 200606-08)
Severity: high
Exploitable: remote
Date: June 09, 2006
Updated: June 10, 2006
Bug(s): #134397
ID: 200606-08
Synopsis
WordPress fails to sufficiently check the format of cached username data.
Background
WordPress is a PHP and MySQL based content management and publishing system.
Affected Packages
Package: www-apps/wordpress
Vulnerable: < 2.0.3
Unaffected: >= 2.0.3
Architectures: All supported architectures
Description
rgod discovered that WordPress insufficiently checks the format of cached username data.
Impact
An attacker could exploit this vulnerability to execute arbitrary commands by sending a specially crafted username. As of Wordpress 2.0.2 the user data cache is disabled by default.
Workaround
There are no known workarounds at this time.
Resolution
All WordPress users should upgrade to the latest available version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/wordpress-2.0.3" |
References
CVE-2006-2667
CVE-2006-2702
Last edited by GLSA on Sun Jul 30, 2006 4:18 am; edited 3 times in total |
|