Date: Wed, 9 Feb 2011 16:58:24 -0500 (EST) From: Josh Bressers <bressers@...hat.com> To: oss-security@...ts.openwall.com Cc: coley <coley@...re.org> Subject: Re: CVE request: wordpress before 3.0.5 ----- Original Message ----- > http://wordpress.org/news/2011/02/wordpress-3-0-5/ > > From release announcement, I'm unsure which of them deserves CVEs: > > "Two moderate security issues were fixed that could have allowed a > Contributor- or Author-level user to gain further access to the site. > > One information disclosure issue was addressed that could have allowed > an Author-level user to view contents of posts they should not be able > to see, such as draft or private posts. > > Two security enhancements were added. One improved the security of any > plugins which were not properly leveraging our security API. The other > offers additional defense in depth against a vulnerability that was > fixed in previous release." > > > I'm not going to assign anything to the "enhancements" unless someone wants me to. They don't sound like security flaws. There is more information on these here: http://codex.wordpress.org/Version_3.0.5 # Fix XSS bug: Properly encode title used in Quick/Bulk Edit, and offer additional sanitization to various fields. Affects users of the Author or Contributor role. (r17397, r17406, r17412) # Fix XSS bug: Preserve tag escaping in the tags meta box. Affects users of the Author or Contributor role. (r17401) Use CVE-2011-0700 for the XSS flaws. # Fix potential information disclosure of posts through the media uploader. Affects users of the Author role. (r17393) Use CVE-2011-0701 for the information disclosure. Thanks. -- JB
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.