aboutsummaryrefslogtreecommitdiffstats
path: root/security
diff options
context:
space:
mode:
authorwoodsb02 <woodsb02@FreeBSD.org>2017-01-29 11:13:21 +0800
committerwoodsb02 <woodsb02@FreeBSD.org>2017-01-29 11:13:21 +0800
commit6174b765bc1b6bf8f2573029f4c014b7a89cb766 (patch)
tree42a6e846c0d1469befb36ca21292e60d8b8894ed /security
parent92c8063d974526a27b271eec1c881464543ea349 (diff)
downloadfreebsd-ports-gnome-6174b765bc1b6bf8f2573029f4c014b7a89cb766.tar.gz
freebsd-ports-gnome-6174b765bc1b6bf8f2573029f4c014b7a89cb766.tar.zst
freebsd-ports-gnome-6174b765bc1b6bf8f2573029f4c014b7a89cb766.zip
Document Wordpress security issues in 4.7.1.
PR: 216540 PR: 216515 Reported by: Jochen Neumeister <joneum@bsdproject.de> Reported by: Mikhail Timofeev <9267096@gmail.com> Security: CVE-2017-5610 Security: CVE-2017-5611 Security: CVE-2017-5612 Security: https://vuxml.FreeBSD.org/freebsd/14ea4458-e5cd-11e6-b56d-38d547003487.html
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml48
1 files changed, 48 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index 4f0937f5b19c..f197c8105a84 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,54 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="14ea4458-e5cd-11e6-b56d-38d547003487">
+ <topic>wordpress -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>wordpress</name>
+ <range><lt>4.7.2,1</lt></range>
+ </package>
+ <package>
+ <name>de-wordpress</name>
+ <name>ja-wordpress</name>
+ <name>ru-wordpress</name>
+ <name>zh-wordpress-zh_CN</name>
+ <name>zh-wordpress-zh_TW</name>
+ <range><lt>4.7.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Aaron D. Campbell reports:</p>
+ <blockquote cite="https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/">
+ <p>WordPress versions 4.7.1 and earlier are affected by three security
+ issues:</p>
+ <ul>
+ <li>The user interface for assigning taxonomy terms in Press This is
+ shown to users who do not have permissions to use it.</li>
+ <li>WP_Query is vulnerable to a SQL injection (SQLi) when passing
+ unsafe data. WordPress core is not directly vulnerable to this
+ issue, but we’ve added hardening to prevent plugins and
+ themes from accidentally causing a vulnerability.</li>
+ <li>A cross-site scripting (XSS) vulnerability was discovered in the
+ posts list table.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2017-5610</cvename>
+ <cvename>CVE-2017-5611</cvename>
+ <cvename>CVE-2017-5612</cvename>
+ <url>http://www.openwall.com/lists/oss-security/2017/01/28/5</url>
+ <url>https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/</url>
+ </references>
+ <dates>
+ <discovery>2017-01-26</discovery>
+ <entry>2017-01-29</entry>
+ </dates>
+ </vuln>
+
<vuln vid="6e83b2f3-e4e3-11e6-9ac1-a4badb2f4699">
<topic>nfsen -- remote command execution</topic>
<affects>