Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 8 Jul 2014 12:41:13 -0400 (EDT)
From: cve-assign@...re.org
To: henri@...v.fi
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: WordPress plugin wysija-newsletters remote file upload

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> https://wordpress.org/plugins/wysija-newsletters/changelog/
> 2.6.7 - 2014-07-01
> Fixed security issue reported by Sucuri
> http://blog.sucuri.net/2014/07/remote-file-upload-vulnerability-on-mailpoet-wysija-newsletters.html

> the developers assumed that WordPress's "admin_init" hooks were only
> called when an administrator user visited a page inside /wp-admin/.

> It is a easy mistake to make and they used that hook (admin_init) to
> verify if a specific user was allowed to upload files.

Use CVE-2014-4725.


> https://wordpress.org/plugins/wysija-newsletters/changelog/
> 2.6.8 - 2014-07-04
> Fixed security issue reported by Dominic

This seems to be an unspecified vulnerability with a different
discoverer. Use CVE-2014-4726.


> http://blog.sucuri.net/2014/07/remote-file-upload-vulnerability-on-mailpoet-wysija-newsletters.html

> WordPress's "admin_init" hooks

> any call to /wp-admin/admin-post.php also executes this hook without
> requiring the user to be authenticated

As far as we can tell, this is intentional behavior in WordPress, and
is not a WordPress implementation error or vulnerability. There is no
CVE ID for this WordPress behavior.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJTvB7EAAoJEKllVAevmvmsXpAH/2HeRED+w5BlsPaGIkGFXaqT
FGdOCgYyjfwCISZQqaIvUds81sKJMewfcv/2naoY+MU2/IWDAPME8vAFuJiZpwPq
SL8BsUlIB4D0uizC/vhJHuf4G7Fw0+qlTy2O2nMdcZ+5TZlu626M7WvRUE4pJj37
q86dmqqnF9CjiQWLBx2UKb0xLfrCGBQyqXMjZlvvyTI7wbZLjwFoxSJ4UqNM1My1
5LkY4L3DGyGaNrrNZOdM3OGKhNtTrJl630TIqhwu+hnKIvrY5N2WPFHHoZ2V7K8P
QFktGYlW5zej5jGi11ZGX5bWa8sWtBYQNXge9AUjQSaiaSSuDNkoey3dgx5Mk5E=
=dY+t
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ