Your message dated Sat, 09 May 2020 15:33:48 +0000
with message-id <[email protected]>
and subject line Bug#959391: fixed in wordpress 4.7.5+dfsg-2+deb9u6
has caused the Debian Bug report #959391,
regarding wordpress: CVE-2020-11025 CVE-2020-11026 CVE-2020-11027 
CVE-2020-11028 CVE-2020-11029 CVE-2020-11030
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
959391: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: wordpress
Version: 5.4+dfsg1-1
Severity: grave
Tags: security upstream
Justification: user security hole

Hi,

The following vulnerabilities were published for wordpress.

Fortunately this time additionally to [6], there are GHSA advisories
associated with each of this CVEs (advantage of hosting a project on
github I would say :)). Now they list some ranges of affected
versions, and I'm interested to track which are actually not affecting
buster and stretch. Could you check if those are actually acurate? For
example CVE-2020-11030 lists via the GHSA as affected versions 5.2 to
5.4, and patched in 5.4.1, 5.3.3 and 5.2.6. Is this correct so which
would mean buster and stretch are not affected?

CVE-2020-11025[0]:
| In affected versions of WordPress, a cross-site scripting (XSS)
| vulnerability in the navigation section of Customizer allows
| JavaScript code to be executed. Exploitation requires an authenticated
| user. This has been patched in version 5.4.1, along with all the
| previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5,
| 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27,
| 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).


CVE-2020-11026[1]:
| In affected versions of WordPress, files with a specially crafted name
| when uploaded to the Media section can lead to script execution upon
| accessing the file. This requires an authenticated user with
| privileges to upload files. This has been patched in version 5.4.1,
| along with all the previously affected versions via a minor release
| (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21,
| 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).


CVE-2020-11027[2]:
| In affected versions of WordPress, a password reset link emailed to a
| user does not expire upon changing the user password. Access would be
| needed to the email account of the user by a malicious party for
| successful execution. This has been patched in version 5.4.1, along
| with all the previously affected versions via a minor release (5.3.3,
| 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22,
| 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).


CVE-2020-11028[3]:
| In affected versions of WordPress, some private posts, which were
| previously public, can result in unauthenticated disclosure under a
| specific set of conditions. This has been patched in version 5.4.1,
| along with all the previously affected versions via a minor release
| (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21,
| 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).


CVE-2020-11029[4]:
| In affected versions of WordPress, a vulnerability in the stats()
| method of class-wp-object-cache.php can be exploited to execute cross-
| site scripting (XSS) attacks. This has been patched in version 5.4.1,
| along with all the previously affected versions via a minor release
| (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21,
| 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).


CVE-2020-11030[5]:
| In affected versions of WordPress, a special payload can be crafted
| that can lead to scripts getting executed within the search block of
| the block editor. This requires an authenticated user with the ability
| to add content. This has been patched in version 5.4.1, along with all
| the previously affected versions via a minor release (5.3.3, 5.2.6,
| 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23,
| 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2020-11025
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11025
[1] https://security-tracker.debian.org/tracker/CVE-2020-11026
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11026
[2] https://security-tracker.debian.org/tracker/CVE-2020-11027
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11027
[3] https://security-tracker.debian.org/tracker/CVE-2020-11028
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11028
[4] https://security-tracker.debian.org/tracker/CVE-2020-11029
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11029
[5] https://security-tracker.debian.org/tracker/CVE-2020-11030
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11030
[6] 
https://wordpress.org/support/wordpress-version/version-5-4-1/#security-updates

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: wordpress
Source-Version: 4.7.5+dfsg-2+deb9u6
Done: Craig Small <[email protected]>

We believe that the bug you reported is fixed in the latest version of
wordpress, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Craig Small <[email protected]> (supplier of updated wordpress package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sat, 02 May 2020 15:23:57 +1000
Source: wordpress
Binary: wordpress wordpress-l10n wordpress-theme-twentysixteen 
wordpress-theme-twentyfifteen wordpress-theme-twentyseventeen
Architecture: source
Version: 4.7.5+dfsg-2+deb9u6
Distribution: stretch-security
Urgency: high
Maintainer: Craig Small <[email protected]>
Changed-By: Craig Small <[email protected]>
Description:
 wordpress  - weblog manager
 wordpress-l10n - weblog manager - language files
 wordpress-theme-twentyfifteen - weblog manager - twentytfifteen theme files
 wordpress-theme-twentyseventeen - weblog manager - twentyseventeen theme files
 wordpress-theme-twentysixteen - weblog manager - twentysixteen theme files
Closes: 924546 939543 942459 946905 959391
Changes:
 wordpress (4.7.5+dfsg-2+deb9u6) stretch-security; urgency=high
 .
   * Importing Wordpress 4.7.17/5.4.1 updates Closes: #959391
    - CVE-2020-11025
      XSS vulnerability in the navigation section of Customizer allows
      JavaScript code to be executed.
    - CVE-2020-11026
      uploaded files to Media section to lead to script execution
    - CVE-2020-11027
      Password reset link does not expire
    - CVE-2020-11028
      Private posts can be found through searching by date
    - CVE-2020-11029
      XSS in stats() method in class-wp-object-cache
    Not vulnerable:
    - CVE-2020-11030 (feature introduced 5.0)
      Special payload can execute scripts in block editor
   * Importing Wordpress 4.7.16/5.3.1 updates Closes: #946905
     - CVE-2019-20043
       an unprivileged user could make a post sticky via the REST API.
     - CVE-2019-20041
       hardening wp_kses_bad_protocol() to ensure that it is aware
       of the named colon attribute.
     Not vulnerable:
     - CVE-2019-20042 (function introduced 5.1.0)
       cross-site scripting (XSS) could be stored in well-crafted links
     - CVE-2019-16780 and CVE-2019-16781 (feature introduced 5.0)
       stored XSS vulnerability using block editor content.
   * Importing Wordpress 4.7.15/5.2.4 updates Closes: #942459
      - CVE-2019-17674
        Stored XSS in the Customizer
      - CVE-2019-17671
        Viewing unauthenticated posts
      - CVE-2019-17672
        Stored XSS to inject javascript into style tags
      - CVE-2019-17673
        Poisoning JSON GET requests
      - CVE-2019-17669
        SSRF in URL vaidation
      - CVE-2019-17675
        Referer validation in admin screens
   * Importing Wordpress 4.7.14/5.2.3 updates Closes: #939543
      - CVE-2019-16223
        XSS in post previews
      - CVE-2019-16218
        XSS in stored comments
      - CVE-2019-16220
        Open redirect due to validation and sanitization
      - CVE-2019-16217
        XSS in media uploads
      - CVE-2019-16219
        XSS in shortcode previews
      - CVE-2019-16221
        XSS in dashboard
      - CVE-2019-16222
        XSS in URL sanitization
   * Security patches from 5.1.1/4.7.13
   * Fixes XSS security hole in comments CVE-2019-9787 Closes: #924546
Checksums-Sha1:
 e578da770e89b37231e62beaf21167cd1a3bbcbb 2567 wordpress_4.7.5+dfsg-2+deb9u6.dsc
 dc36d0ebb054c9f215d8e5430d4ecb94c87ec34a 6834780 
wordpress_4.7.5+dfsg-2+deb9u6.debian.tar.xz
 c1bd39b032c5edb941434e9a2e07150fe3f8fa59 7841 
wordpress_4.7.5+dfsg-2+deb9u6_amd64.buildinfo
Checksums-Sha256:
 ebf02bb97a238345edfa259e3a6197941efe70ba9ce53b21965317745277b414 2567 
wordpress_4.7.5+dfsg-2+deb9u6.dsc
 b21523640b8854944f8239634d5695c7c9398421dd7a00b448c3ed43c42e78a1 6834780 
wordpress_4.7.5+dfsg-2+deb9u6.debian.tar.xz
 afd3d9c96318763227ace066cba187fefd84e77b089a57cd1370efe3a9d20123 7841 
wordpress_4.7.5+dfsg-2+deb9u6_amd64.buildinfo
Files:
 9d886fa75fef2d75da4aa64866487a65 2567 web optional 
wordpress_4.7.5+dfsg-2+deb9u6.dsc
 b01623c5fb1b5d2af3c1e46f434a57e1 6834780 web optional 
wordpress_4.7.5+dfsg-2+deb9u6.debian.tar.xz
 3cef192f52b7480ba154fc29fd25710e 7841 web optional 
wordpress_4.7.5+dfsg-2+deb9u6_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=wL1N
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to