Debian DSA-2718-1 : wordpress - several vulnerabilities

medium Nessus Plugin ID 67131

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities were identified in WordPress, a web blogging tool. As the CVEs were allocated from releases announcements and specific fixes are usually not identified, it has been decided to upgrade the wordpress package to the latest upstream version instead of backporting the patches.

This means extra care should be taken when upgrading, especially when using third-party plugins or themes, since compatibility may have been impacted along the way. We recommend that users check their install before doing the upgrade.

- CVE-2013-2173 A denial of service was found in the way WordPress performs hash computation when checking password for protected posts. An attacker supplying carefully crafted input as a password could make the platform use excessive CPU usage.

- CVE-2013-2199 Multiple server-side requests forgery (SSRF) vulnerabilities were found in the HTTP API. This is related to CVE-2013-0235, which was specific to SSRF in pingback requests and was fixed in 3.5.1.

- CVE-2013-2200 Inadequate checking of a user's capabilities could lead to a privilege escalation, enabling them to publish posts when their user role should not allow for it and to assign posts to other authors.

- CVE-2013-2201 Multiple cross-side scripting (XSS) vulnerabilities due to badly escaped input were found in the media files and plugins upload forms.

- CVE-2013-2202 XML External Entity Injection (XXE) vulnerability via oEmbed responses.

- CVE-2013-2203 A Full path disclosure (FPD) was found in the file upload mechanism. If the upload directory is not writable, the error message returned includes the full directory path.

- CVE-2013-2204 Content spoofing via Flash applet in the embedded tinyMCE media plugin.

- CVE-2013-2205 Cross-domain XSS in the embedded SWFupload uploader.

Solution

Upgrade the wordpress packages.

For the oldstable distribution (squeeze), these problems have been fixed in version 3.5.2+dfsg-1~deb6u1.

For the stable distribution (wheezy), these problems have been fixed in version 3.5.2+dfsg-1~deb7u1.

See Also

https://security-tracker.debian.org/tracker/CVE-2013-2173

https://security-tracker.debian.org/tracker/CVE-2013-2199

https://security-tracker.debian.org/tracker/CVE-2013-0235

https://security-tracker.debian.org/tracker/CVE-2013-2200

https://security-tracker.debian.org/tracker/CVE-2013-2201

https://security-tracker.debian.org/tracker/CVE-2013-2202

https://security-tracker.debian.org/tracker/CVE-2013-2203

https://security-tracker.debian.org/tracker/CVE-2013-2204

https://security-tracker.debian.org/tracker/CVE-2013-2205

https://packages.debian.org/source/squeeze/wordpress

https://packages.debian.org/source/wheezy/wordpress

https://www.debian.org/security/2013/dsa-2718

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=713947

Plugin Details

Severity: Medium

ID: 67131

File Name: debian_DSA-2718.nasl

Version: 1.12

Type: local

Agent: unix

Published: 7/3/2013

Updated: 1/11/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:wordpress, cpe:/o:debian:debian_linux:6.0, cpe:/o:debian:debian_linux:7.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 7/1/2013

Reference Information

CVE: CVE-2013-2173, CVE-2013-2199, CVE-2013-2200, CVE-2013-2201, CVE-2013-2202, CVE-2013-2203, CVE-2013-2204, CVE-2013-2205

BID: 60477, 60757, 60758, 60759, 60770, 60775, 60781, 60825

DSA: 2718