Launchpad has imported 6 comments from the remote bug at
https://bugzilla.redhat.com/show_bug.cgi?id=659265.

If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.launchpad.net/InterBugTracking.

------------------------------------------------------------------------
On 2010-12-02T10:52:59+00:00 Jan wrote:

An improper input sanitization flaw was found in the way Wordpress
performed trackbacks (a way to notify a website when an entry that
references it is published) maintainance. A remote attacker,
with Author-level privilege could use this flaw to conduct
SQL injection attacks (gain further access to the site, which
should be otherwise prohibited).

References:
[1] http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=605603
[2] http://codex.wordpress.org/Version_3.0.2

Upstream changeset:
[3] http://core.trac.wordpress.org/changeset/16625

Note: You may want to use w3m browser, when trying to access [2],
      and [3], as we are having troubles / timeouts, when accessing
      it via firefox / konqueror. Will post a copy of upstream patch
      here.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wordpress/+bug/716641/comments/0

------------------------------------------------------------------------
On 2010-12-02T10:56:38+00:00 Jan wrote:

This issue affects the version of the wordpress package, as shipped
with Fedora release of 13 and 14.

Please fix.

--

This issue affects the version of the wordpress package, as present
within EPEL-5 repository.

Please schedule an update.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wordpress/+bug/716641/comments/1

------------------------------------------------------------------------
On 2010-12-02T11:02:51+00:00 Jan wrote:

Created attachment 464225
Promised local copy of upstream changeset

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wordpress/+bug/716641/comments/2

------------------------------------------------------------------------
On 2010-12-02T14:42:04+00:00 Jan wrote:

CVE Request:
http://www.openwall.com/lists/oss-security/2010/12/02/1

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wordpress/+bug/716641/comments/3

------------------------------------------------------------------------
On 2010-12-02T14:44:36+00:00 Jan wrote:

Created wordpress tracking bugs for this issue

Affects: fedora-all [bug 659319]

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wordpress/+bug/716641/comments/4

------------------------------------------------------------------------
On 2010-12-03T11:00:41+00:00 Jan wrote:

The CVE identifier of CVE-2010-4257 has been assigned to this issue.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/wordpress/+bug/716641/comments/5


** Changed in: wordpress (Fedora)
       Status: Unknown => Fix Released

** Changed in: wordpress (Fedora)
   Importance: Unknown => Medium

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/716641

Title:
  CVE-2010-4257: SQL Injection from trackback functions

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/wordpress/+bug/716641/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to