Security
Headlines
HeadlinesLatestCVEs

Headline

Debian Security Advisory 5279-2

Debian Linux Security Advisory 5279-2 - Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform SQL injection, create open redirects, bypass authorization access, or perform Cross-Site Request Forgery (CSRF) or Cross-Site Scripting (XSS) attacks. The wordpress package released in DSA-5279-1 had incorrect dependencies that could not be satisfied in Debian stable. This update corrects the problem.

Packet Storm
#sql#xss#csrf#vulnerability#web#linux#debian#wordpress#auth
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512- -------------------------------------------------------------------------Debian Security Advisory DSA-5279-2                   [email protected]://www.debian.org/security/                       Sebastien DelafondNovember 17, 2022                     https://www.debian.org/security/faq- -------------------------------------------------------------------------Package        : wordpressDebian Bug     : 1007005 1018863 1022575 1024249The wordpress package released in DSA-5279-1 had incorrectdependencies that could not be satisfied in Debian stable: this updatecorrects the problem. For reference, the original advisory text isprovided here again:  Several vulnerabilities were discovered in Wordpress, a web blogging  tool. They allowed remote attackers to perform SQL injection, create  open redirects, bypass authorization access, or perform Cross-Site  Request Forgery (CSRF) or Cross-Site Scripting (XSS) attacks.For the stable distribution (bullseye), this problem has been fixed inversion 5.7.8+dfsg1-0+deb11u2.We recommend that you upgrade your wordpress packages.For the detailed security status of wordpress please refer toits security tracker page at:https://security-tracker.debian.org/tracker/wordpressFurther information about Debian Security Advisories, how to applythese updates to your system and frequently asked questions can befound at: https://www.debian.org/security/Mailing list: [email protected] PGP SIGNATURE-----iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAmN13KoACgkQEL6Jg/PVnWSnyggAvAS8Crzgp8xW8FvZ20pEz0uXm8oW+5sUR7U+c6vsUPXBa2yT+pLNyCGnSs9ffvl+IVnfZEHK70PvK61thKS9yhtse0fy25HljMnsBBSzMtjZEwZOHGpERNRWYf7Cm5ubIlKumKLodGh+Ecun01DRawfG/W4V+sBnDZWGdn9+B9K6q7vYLRDowshisdJczvrRn2vr88V+LLzbgVDv3M1WcM+dbyEOOtxY29ELuHODgafZNIiMyjxpy3RIiZg5c2uS4RxojN61TxKpD2ewdSRrqAy51SspUSMZIV9l2hQkhMfOm/8x1MLAWVO0v/PaS8NsyR1P454NCwhRRmNbJ5252w==hTKc-----END PGP SIGNATURE-----

Packet Storm: Latest News

Ubuntu Security Notice USN-7089-6