=========================================================================== ZMCIRT Vulnerability Bulletin ZMC-2021.04.22.0900 wordpress: Multiple vulnerabilities 21st April 2021 =========================================================================== Product: wordpress Publisher: Debian Operating System: Debian GNU/Linux UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Access Confidential Data -- Existing Account Reduced Security -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-29450 CVE-2021-29447 Original Bulletin: http://www.debian.org/lts/security/2021/dla-2630 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running wordpress check for an updated version of the software for their operating system. - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - - ----------------------------------------------------------------------- Debian LTS Advisory DLA-2630-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Utkarsh Gupta April 21, 2021 https://wiki.debian.org/LTS - - ----------------------------------------------------------------------- Package : wordpress Version : 4.7.20+dfsg-1+deb9u1 CVE ID : CVE-2021-29447 CVE-2021-29450 Debian Bug : 987065 CVE-2021-29447 Wordpress is an open source CMS. A user with the ability to upload files (like an Author) can exploit an XML parsing issue in the Media Library leading to XXE attacks. This requires WordPress installation to be using PHP 8. Access to internal files is possible in a successful XXE attack. CVE-2021-29450 Wordpress is an open source CMS. One of the blocks in the WordPress editor can be exploited in a way that exposes password-protected posts and pages. This requires at least contributor privileges. For Debian 9 stretch, these problems have been fixed in version 4.7.20+dfsg-1+deb9u1. We recommend that you upgrade your wordpress packages. For the detailed security status of wordpress please refer to its security tracker page at: https://security-tracker.debian.org/tracker/wordpress Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS ZMCIRT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. ZMCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Internet Email: report@cirt.zm Telephone: 7070 ZMCIRT personnel answer during Zambian business hours which are 8am to 5pm. On call after hours for member emergencies only. ===========================================================================
Copyright @2023 ZAMBIA CIRT