lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <69ff7065-7041-a6a1-6ad2-3fd5fe06764e@securify.nl> Date: Wed, 17 May 2017 18:18:27 +0200 From: Summer of Pwnage <lists@...urify.nl> To: fulldisclosure@...lists.org Subject: Re: [FD] Cross-Site Request Forgery in WordPress Connection Information This issue is resolved in WordPress version 4.7.5. https://wordpress.org/news/2017/05/wordpress-4-7-5/ On 21-04-17 00:29, Summer of Pwnage wrote: > ------------------------------------------------------------------------ > Cross-Site Request Forgery in WordPress Connection Information > ------------------------------------------------------------------------ > Yorick Koster, July 2016 > > ------------------------------------------------------------------------ > Abstract > ------------------------------------------------------------------------ > The FTP/SSH form functionality of WordPress was found to be vulnerable > to Cross-Site Request Forgery. This vulnerability can be used to > overwrite the FTP or SSH connection settings of the affected WordPress > site. An attacker can use this issue to trick an Administrator into > logging into the attacker's FTP or SSH server, disclosing his/her login > credentials to the attacker. In order to exploit this vulnerability, the > attacker has to lure/force a logged on WordPress Administrator into > opening a malicious website. > > > ------------------------------------------------------------------------ > OVE ID > ------------------------------------------------------------------------ > OVE-20160717-0004 > > ------------------------------------------------------------------------ > Tested versions > ------------------------------------------------------------------------ > This issue was successfully tested on the WordPress version 4.5.3 up > till and including version 4.7.4. > > ------------------------------------------------------------------------ > Fix > ------------------------------------------------------------------------ > There is currently no fix available. > > ------------------------------------------------------------------------ > Details > ------------------------------------------------------------------------ > https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_wordpress_connection_information.html > > > ------------------------------------------------------------------------ > Summer of Pwnage (https://sumofpwn.nl) is a Dutch community project. Its > goal is to contribute to the security of popular, widely used OSS > projects in a fun and educational way. _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists