Bug 250751 (CVE-2007-4139) - CVE-2007-4139 WordPress 2.2.1 wp-admin/upload.php XSS
Summary: CVE-2007-4139 WordPress 2.2.1 wp-admin/upload.php XSS
Status: CLOSED ERRATA
Alias: CVE-2007-4139
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL: http://mybeni.rootzilla.de/mybeNi/200...
Whiteboard:
Keywords: Security
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2007-08-03 14:18 UTC by Lubomir Kundrak
Modified: 2008-01-09 12:16 UTC (History)
0 users

(edit)
Clone Of:
(edit)
Last Closed: 2008-01-09 12:16:12 UTC


Attachments (Terms of Use)

Description Lubomir Kundrak 2007-08-03 14:18:18 UTC
Description of problem:

Name: CVE-2007-4139
Status: Candidate
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4139
Final-Decision: 
Interim-Decision: 
Modified: 
Proposed: 
Assigned: 20070802
Category: 
Reference:
MISC:http://mybeni.rootzilla.de/mybeNi/2007/wordpress_zeroday_vulnerability_roundhouse_kick_and_why_i_nearly_wrote_the_first_blog_worm/
Reference: CONFIRM:http://trac.wordpress.org/attachment/ticket/4689/4689.diff
Reference: CONFIRM:http://trac.wordpress.org/ticket/4689
Reference: FRSIRT:ADV-2007-2744
Reference: URL:http://www.frsirt.com/english/advisories/2007/2744
Reference: SECUNIA:26296
Reference: URL:http://secunia.com/advisories/26296
Reference: XF:wordpress-upload-xss(35718)
Reference: URL:http://xforce.iss.net/xforce/xfdb/35718

Cross-site scripting (XSS) vulnerability in the Temporary Uploads
editing functionality (wp-admin/includes/upload.php) in WordPress
2.2.1, allows remote attackers to inject arbitrary web script or HTML
via the style parameter to wp-admin/upload.php.

Comment 1 Tomas Hoger 2008-01-09 12:16:12 UTC
Issue was fixed in upstream version 2.2.2.  Current versions of Fedora ship
newer versions of wordpress.


Note You need to log in before you can comment on or make changes to this bug.