Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 24 Jun 2015 21:21:06 -0400 (EDT)
From: cve-assign@...re.org
To: disclosure@...sec.de
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request for Wordpress-Plugin Broken Link Checker v1.10.8: Persistent XSS in admin panel enabled by modified headers

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Persistent XSS in wordpress-admin-panel enabled by not proper sanitized
> HTTP-Headers.
> There are no special priviliges required to exploit this vulnerability.

> fixed in version 1.10.9, 2015-06-19
> https://wordpress.org/plugins/broken-link-checker/changelog/

>> Fixed a security vulnerability where part of the log data visibile in
>> the "Details" view was not properly sanitized.

Use CVE-2015-5057.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVi1a+AAoJEKllVAevmvms/QgIAJyJGmjfYa6hrC1WGDacj6Dd
OT3keKp81n2peXJX9xoEyVmqxE6BNojePbNpG+tkrjlODB6g3Zp6wC3VnSbuxT1e
KGA0/qNtiRT30+tiEFwwbofG58UAzCKlG5k/6oB0WSJP//OsquHATkL4ayHl92yw
G7xeWOuZHhZl7jyCgapfVBLTLIrUNNB80TOiGUY3OcjL4J2PQP5AlCcqCqUcCkij
hqBWpkrSs2lbOs57K5oJRdGHlVdGEp2zXDTlXLPBbwctR0S+0BkrF1lIW2RxLmwJ
5qAuL/70t1Wj1sJ5odpMG3bMvOE2B7iTW6HCLqzQLjY8r3ADtY+o82Pa03OKHrI=
=yIkG
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ