Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 21 Jan 2013 00:11:54 -0700
From: Kurt Seifried <kseifried@...hat.com>
To: oss-security@...ts.openwall.com
CC: Henrique <typoon@...il.com>
Subject: Re: CVE Request - Wordpress 3.5 Full-path disclosure
 vulnerability

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On 01/20/2013 01:18 PM, Henrique wrote:
> Hello,
> 
> This is a request for a CVE for an issue with Wordpress 3.5 (and
> probably earlier versions) that allows a full-path disclosure. The
> issue can be reproduced by accessing the URL as follows:
> 
> http://wordpress_site/?s[]=1
> 
> producing the error:
> 
> Warning: stripslashes() expects parameter 1 to be string, array
> given in /home/gilgamesh/security/wpress/wp-includes/query.php on
> line 2184
> 
> Before sanitizing the input, the variables passed should be
> validated that they have the correct type in order to avoid such
> issues.
> 
> The wordpress team has already been notified and say they will look
> into the code to improve it.
> 
> Regards,
> 
> Henrique

I can't get this to work anywhere. Does it require a specific theme or
configuration? Do you have details that can aid in reproduction?



- -- 
Kurt Seifried Red Hat Security Response Team (SRT)
PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQIcBAEBAgAGBQJQ/Oo6AAoJEBYNRVNeJnmTrnoQAJTWO+BL07YlQrzHs4kKbgyL
1X6YnOWKnz7WSH5sBPaSg2ziAo+o0unyTEf196YdHWeN2Gj6+O5dcofb1zuZKxy2
0v74bVWsPS5FC40o3sXEXoe9ArBddR9iFr1BGJvD1+0MRjhkp0vFieBqv8Rl/Y6x
QrUwtAOXGxgRVvo7eIpRFjvEhhKYLA1UIfuhMfMOw6T+3iWk4h2Nf52RRdF1WUTW
KIJdVbcoPuUjbXJgylEqGt7di1XuAdjwIZlyyU1dXkNF1MRqb85kGXf+PIjFl2aK
E9dOnUakMEYWR69cxhid1M7+9vtOUC6ABluxEu5xk1w4RMSWusWjQr7Fl9ZupGpb
ZATGXzxbyiBsbsvZwbazBJeYOlAeABZFmGx3AWoTaXDeF+4murBMpIxIRf8UOyuA
epFnbicPVDEAeAYiHQaoYiGtk6DTP8aH960TI10I4PZruxJO8hqLASx3x03gmZUB
yFtmjv66IJECpw7XFTW3JjRlavVjeIzY2ooy3OputDCAxmc2n+9M2wP/YngR//qD
dvkZ226/bgdzTanP4oaKT42v+UKIu7NEIQz6BCCQzcNJQQn6NsEjyjvv7wM3S7d0
DqS8Aq2b46RpbU05sDayEnibIh7RiGLNMQ6OpOPLgZVR62WMpacpBH4cMI4khB9u
yHIVhZMm7R0hoIFlRHE9
=IGxe
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.