Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 24 Jun 2015 21:21:06 -0400 (EDT)
From: cve-assign@...re.org
To: disclosure@...sec.de
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE Request for Wordpress-Plugin Broken Link Checker v1.10.8: Persistent XSS in admin panel enabled by modified headers

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> Persistent XSS in wordpress-admin-panel enabled by not proper sanitized
> HTTP-Headers.
> There are no special priviliges required to exploit this vulnerability.

> fixed in version 1.10.9, 2015-06-19
> https://wordpress.org/plugins/broken-link-checker/changelog/

>> Fixed a security vulnerability where part of the log data visibile in
>> the "Details" view was not properly sanitized.

Use CVE-2015-5057.

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJVi1a+AAoJEKllVAevmvms/QgIAJyJGmjfYa6hrC1WGDacj6Dd
OT3keKp81n2peXJX9xoEyVmqxE6BNojePbNpG+tkrjlODB6g3Zp6wC3VnSbuxT1e
KGA0/qNtiRT30+tiEFwwbofG58UAzCKlG5k/6oB0WSJP//OsquHATkL4ayHl92yw
G7xeWOuZHhZl7jyCgapfVBLTLIrUNNB80TOiGUY3OcjL4J2PQP5AlCcqCqUcCkij
hqBWpkrSs2lbOs57K5oJRdGHlVdGEp2zXDTlXLPBbwctR0S+0BkrF1lIW2RxLmwJ
5qAuL/70t1Wj1sJ5odpMG3bMvOE2B7iTW6HCLqzQLjY8r3ADtY+o82Pa03OKHrI=
=yIkG
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.