Vulnerabilities > CVE-2019-16220 - Open Redirect vulnerability in multiple products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
LOW Integrity impact
LOW Availability impact
NONE Summary
In WordPress before 5.2.3, validation and sanitization of a URL in wp_validate_redirect in wp-includes/pluggable.php could lead to an open redirect if a provided URL path does not start with a forward slash.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- Fake the Source of Data An adversary provides data under a falsified identity. The purpose of using the falsified identity may be to prevent traceability of the provided data or it might be an attempt by the adversary to assume the rights granted to another identity. One of the simplest forms of this attack would be the creation of an email message with a modified "From" field in order to appear that the message was sent from someone other than the actual sender. Results of the attack vary depending on the details of the attack, but common results include privilege escalation, obfuscation of other attacks, and data corruption/manipulation.
Nessus
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-4677.NASL description Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform various Cross-Side Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks, create files on the server, disclose private information, create open redirects, poison cache, and bypass authorization access and input sanitation. last seen 2020-05-12 modified 2020-05-07 plugin id 136373 published 2020-05-07 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/136373 title Debian DSA-4677-1 : wordpress - security update code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-4677. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(136373); script_version("1.4"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/19"); script_cve_id("CVE-2019-16217", "CVE-2019-16218", "CVE-2019-16219", "CVE-2019-16220", "CVE-2019-16221", "CVE-2019-16222", "CVE-2019-16223", "CVE-2019-16780", "CVE-2019-16781", "CVE-2019-17669", "CVE-2019-17671", "CVE-2019-17672", "CVE-2019-17673", "CVE-2019-17674", "CVE-2019-17675", "CVE-2019-20041", "CVE-2019-20042", "CVE-2019-20043", "CVE-2019-9787", "CVE-2020-11025", "CVE-2020-11026", "CVE-2020-11027", "CVE-2020-11028", "CVE-2020-11029", "CVE-2020-11030"); script_xref(name:"DSA", value:"4677"); script_xref(name:"IAVA", value:"2020-A-0191-S"); script_name(english:"Debian DSA-4677-1 : wordpress - security update"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform various Cross-Side Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks, create files on the server, disclose private information, create open redirects, poison cache, and bypass authorization access and input sanitation." ); script_set_attribute( attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=924546" ); script_set_attribute( attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939543" ); script_set_attribute( attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942459" ); script_set_attribute( attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946905" ); script_set_attribute( attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=959391" ); script_set_attribute( attribute:"see_also", value:"https://security-tracker.debian.org/tracker/source-package/wordpress" ); script_set_attribute( attribute:"see_also", value:"https://packages.debian.org/source/stretch/wordpress" ); script_set_attribute( attribute:"see_also", value:"https://packages.debian.org/source/buster/wordpress" ); script_set_attribute( attribute:"see_also", value:"https://www.debian.org/security/2020/dsa-4677" ); script_set_attribute( attribute:"solution", value: "Upgrade the wordpress packages. For the oldstable distribution (stretch), these problems have been fixed in version 4.7.5+dfsg-2+deb9u6. For the stable distribution (buster), these problems have been fixed in version 5.0.4+dfsg1-1+deb10u2." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:wordpress"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:10.0"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:9.0"); script_set_attribute(attribute:"vuln_publication_date", value:"2019/03/14"); script_set_attribute(attribute:"patch_publication_date", value:"2020/05/06"); script_set_attribute(attribute:"plugin_publication_date", value:"2020/05/07"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_set_attribute(attribute:"stig_severity", value:"II"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"10.0", prefix:"wordpress", reference:"5.0.4+dfsg1-1+deb10u2")) flag++; if (deb_check(release:"10.0", prefix:"wordpress-l10n", reference:"5.0.4+dfsg1-1+deb10u2")) flag++; if (deb_check(release:"10.0", prefix:"wordpress-theme-twentynineteen", reference:"5.0.4+dfsg1-1+deb10u2")) flag++; if (deb_check(release:"10.0", prefix:"wordpress-theme-twentyseventeen", reference:"5.0.4+dfsg1-1+deb10u2")) flag++; if (deb_check(release:"10.0", prefix:"wordpress-theme-twentysixteen", reference:"5.0.4+dfsg1-1+deb10u2")) flag++; if (deb_check(release:"9.0", prefix:"wordpress", reference:"4.7.5+dfsg-2+deb9u6")) flag++; if (deb_check(release:"9.0", prefix:"wordpress-l10n", reference:"4.7.5+dfsg-2+deb9u6")) flag++; if (deb_check(release:"9.0", prefix:"wordpress-theme-twentyfifteen", reference:"4.7.5+dfsg-2+deb9u6")) flag++; if (deb_check(release:"9.0", prefix:"wordpress-theme-twentyseventeen", reference:"4.7.5+dfsg-2+deb9u6")) flag++; if (deb_check(release:"9.0", prefix:"wordpress-theme-twentysixteen", reference:"4.7.5+dfsg-2+deb9u6")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family Debian Local Security Checks NASL id DEBIAN_DSA-4599.NASL description Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform various Cross-Side Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks, create open redirects, poison cache, and bypass authorization access and input sanitation. last seen 2020-06-01 modified 2020-06-02 plugin id 132736 published 2020-01-09 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/132736 title Debian DSA-4599-1 : wordpress - security update code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DSA-4599. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(132736); script_version("1.2"); script_cvs_date("Date: 2020/01/13"); script_cve_id("CVE-2019-16217", "CVE-2019-16218", "CVE-2019-16219", "CVE-2019-16220", "CVE-2019-16221", "CVE-2019-16222", "CVE-2019-16223", "CVE-2019-16780", "CVE-2019-16781", "CVE-2019-17669", "CVE-2019-17671", "CVE-2019-17672", "CVE-2019-17673", "CVE-2019-17674", "CVE-2019-17675", "CVE-2019-20041", "CVE-2019-20042", "CVE-2019-20043"); script_xref(name:"DSA", value:"4599"); script_name(english:"Debian DSA-4599-1 : wordpress - security update"); script_summary(english:"Checks dpkg output for the updated package"); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security-related update." ); script_set_attribute( attribute:"description", value: "Several vulnerabilities were discovered in Wordpress, a web blogging tool. They allowed remote attackers to perform various Cross-Side Scripting (XSS) and Cross-Site Request Forgery (CSRF) attacks, create open redirects, poison cache, and bypass authorization access and input sanitation." ); script_set_attribute( attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=939543" ); script_set_attribute( attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=942459" ); script_set_attribute( attribute:"see_also", value:"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=946905" ); script_set_attribute( attribute:"see_also", value:"https://security-tracker.debian.org/tracker/source-package/wordpress" ); script_set_attribute( attribute:"see_also", value:"https://packages.debian.org/source/buster/wordpress" ); script_set_attribute( attribute:"see_also", value:"https://www.debian.org/security/2020/dsa-4599" ); script_set_attribute( attribute:"solution", value: "Upgrade the wordpress packages. For the stable distribution (buster), these problems have been fixed in version 5.0.4+dfsg1-1+deb10u1." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:wordpress"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:10.0"); script_set_attribute(attribute:"vuln_publication_date", value:"2019/09/11"); script_set_attribute(attribute:"patch_publication_date", value:"2020/01/08"); script_set_attribute(attribute:"plugin_publication_date", value:"2020/01/09"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"10.0", prefix:"wordpress", reference:"5.0.4+dfsg1-1+deb10u1")) flag++; if (deb_check(release:"10.0", prefix:"wordpress-l10n", reference:"5.0.4+dfsg1-1+deb10u1")) flag++; if (deb_check(release:"10.0", prefix:"wordpress-theme-twentynineteen", reference:"5.0.4+dfsg1-1+deb10u1")) flag++; if (deb_check(release:"10.0", prefix:"wordpress-theme-twentyseventeen", reference:"5.0.4+dfsg1-1+deb10u1")) flag++; if (deb_check(release:"10.0", prefix:"wordpress-theme-twentysixteen", reference:"5.0.4+dfsg1-1+deb10u1")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get()); else security_hole(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family CGI abuses NASL id WORDPRESS_5_2_3.NASL description According to its self-reported version number, the WordPress application running on the remote web server is affected by multiple vulnerabilities: - An open redirect vulnerability exists in WordPress due to improper sanitization of user-supplied input to HTTP request parameters. An unauthenticated, remote attacker can exploit this, by convincing a user to click a specially crafted link, to redirect a user to a malicious website. (CVE-2019-16220) - Multiple cross-site scripting (XSS) vulnerabilities exist in WordPress due to improper validation of user-supplied input before returning it to users. An unauthenticated, remote attacker can exploit this, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user last seen 2020-06-01 modified 2020-06-02 plugin id 128554 published 2019-09-09 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/128554 title WordPress <= 3.6.1 / 3.7.x < 3.7.30 / 3.8.x < 3.8.30 / 3.9.x < 3.9.28 / 4.0.x < 4.0.27 / 4.1.x < 4.1.27 / 4.2.x < 4.2.24 / 4.3.x < 4.3.20 / 4.4.x < 4.4.19 / 4.5.x < 4.5.18 / 4.6.x < 4.6.15 / 4.7.x < 4.7.14 / 4.8.x < 4.8.10 / 4.9.x < 4.9.11 / 5.0.x < 5.0.6 / 5.1.x < 5.1.2 / 5.2.x < 5.2.3 Multiple Vulnerabilities code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from WordPress Security Advisory wordpress-5-2-3-security-and-maintenance-release. include('compat.inc'); if (description) { script_id(128554); script_version("1.6"); script_cvs_date("Date: 2019/10/31 15:18:51"); script_cve_id( "CVE-2019-16217", "CVE-2019-16218", "CVE-2019-16219", "CVE-2019-16220", "CVE-2019-16221", "CVE-2019-16222", "CVE-2019-16223" ); script_name(english:"WordPress <= 3.6.1 / 3.7.x < 3.7.30 / 3.8.x < 3.8.30 / 3.9.x < 3.9.28 / 4.0.x < 4.0.27 / 4.1.x < 4.1.27 / 4.2.x < 4.2.24 / 4.3.x < 4.3.20 / 4.4.x < 4.4.19 / 4.5.x < 4.5.18 / 4.6.x < 4.6.15 / 4.7.x < 4.7.14 / 4.8.x < 4.8.10 / 4.9.x < 4.9.11 / 5.0.x < 5.0.6 / 5.1.x < 5.1.2 / 5.2.x < 5.2.3 Multiple Vulnerabilities"); script_summary(english:"Checks the version of WordPress."); script_set_attribute(attribute:"synopsis", value: "Checks the version of WordPress."); script_set_attribute(attribute:"description", value: "According to its self-reported version number, the WordPress application running on the remote web server is affected by multiple vulnerabilities: - An open redirect vulnerability exists in WordPress due to improper sanitization of user-supplied input to HTTP request parameters. An unauthenticated, remote attacker can exploit this, by convincing a user to click a specially crafted link, to redirect a user to a malicious website. (CVE-2019-16220) - Multiple cross-site scripting (XSS) vulnerabilities exist in WordPress due to improper validation of user-supplied input before returning it to users. An unauthenticated, remote attacker can exploit this, by convincing a user to click a specially crafted URL, to execute arbitrary script code in a user's browser session. (CVE-2019-16217, CVE-2019-16218, CVE-2019-16219, CVE-2019-16221, CVE-2019-16222, CVE-2019-16223) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number."); # https://core.trac.wordpress.org/query?status=closed&resolution=fixed&milestone=5.2.3&order=priority script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?721eeb41"); script_set_attribute(attribute:"see_also", value:"https://codex.wordpress.org/WordPress_Versions"); script_set_attribute(attribute:"see_also", value:"https://wordpress.org/support/wordpress-version/version-3-7-30/"); script_set_attribute(attribute:"see_also", value:"https://wordpress.org/support/wordpress-version/version-3-8-30/"); script_set_attribute(attribute:"see_also", value:"https://wordpress.org/support/wordpress-version/version-3-9-28/"); script_set_attribute(attribute:"see_also", value:"https://wordpress.org/support/wordpress-version/version-4-0-27/"); script_set_attribute(attribute:"see_also", value:"https://wordpress.org/support/wordpress-version/version-4-1-27/"); script_set_attribute(attribute:"see_also", value:"https://wordpress.org/support/wordpress-version/version-4-2-24/"); script_set_attribute(attribute:"see_also", value:"https://wordpress.org/support/wordpress-version/version-4-3-20/"); script_set_attribute(attribute:"see_also", value:"https://wordpress.org/support/wordpress-version/version-4-4-19/"); script_set_attribute(attribute:"see_also", value:"https://wordpress.org/support/wordpress-version/version-4-5-18/"); script_set_attribute(attribute:"see_also", value:"https://wordpress.org/support/wordpress-version/version-4-6-15/"); script_set_attribute(attribute:"see_also", value:"https://wordpress.org/support/wordpress-version/version-4-7-14/"); script_set_attribute(attribute:"see_also", value:"https://wordpress.org/support/wordpress-version/version-4-8-10/"); script_set_attribute(attribute:"see_also", value:"https://wordpress.org/support/wordpress-version/version-4-9-11/"); script_set_attribute(attribute:"see_also", value:"https://wordpress.org/support/wordpress-version/version-5-0-6/"); script_set_attribute(attribute:"see_also", value:"https://wordpress.org/support/wordpress-version/version-5-1-2/"); script_set_attribute(attribute:"see_also", value:"https://wordpress.org/support/wordpress-version/version-5-2-3/"); script_set_attribute(attribute:"solution", value: "Upgrade to WordPress version 3.7.30 / 3.8.30 / 3.9.28 / 4.0.27 / 4.1.27 / 4.2.24 / 4.3.20 / 4.4.19 / 4.5.18 / 4.6.15 / 4.7.14 / 4.8.10 / 4.9.11 / 5.0.6 / 5.1.2 / 5.2.3 or later."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-16220"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"vuln_publication_date", value:"2019/09/04"); script_set_attribute(attribute:"patch_publication_date", value:"2019/09/04"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/09/09"); script_set_attribute(attribute:"potential_vulnerability", value:"true"); script_set_attribute(attribute:"plugin_type", value:"remote"); script_set_attribute(attribute:"cpe", value:"cpe:/a:wordpress:wordpress"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"CGI abuses"); script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("wordpress_detect.nasl"); script_require_keys("www/PHP", "installed_sw/WordPress", "Settings/ParanoidReport"); script_require_ports("Services/www", 80, 443); exit(0); } include('vcf.inc'); include('http.inc'); app = 'WordPress'; get_install_count(app_name:app, exit_if_zero:TRUE); if (report_paranoia < 2) audit(AUDIT_PARANOID); port = get_http_port(default:80, php:TRUE); app_info = vcf::get_app_info(app:'WordPress', port:port, webapp:TRUE); # Wordpress backports Security fixes: # https://codex.wordpress.org/WordPress_Versions constraints = [ {'fixed_version':'3.7.30', 'fixed_display':'3.7.30 / 5.2.3 or later'}, {'min_version':'3.8', 'fixed_version':'3.8.30', 'fixed_display':'3.8.30 / 5.2.3 or later' }, {'min_version':'3.9', 'fixed_version':'3.9.28', 'fixed_display':'3.9.28 / 5.2.3 or later' }, {'min_version':'4.0', 'fixed_version':'4.0.27', 'fixed_display':'4.0.27 / 5.2.3 or later' }, {'min_version':'4.1', 'fixed_version':'4.1.27', 'fixed_display':'4.1.27 / 5.2.3 or later' }, {'min_version':'4.2', 'fixed_version':'4.2.24', 'fixed_display':'4.2.24 / 5.2.3 or later' }, {'min_version':'4.3', 'fixed_version':'4.3.20', 'fixed_display':'4.3.20 / 5.2.3 or later' }, {'min_version':'4.4', 'fixed_version':'4.4.19', 'fixed_display':'4.4.19 / 5.2.3 or later' }, {'min_version':'4.5', 'fixed_version':'4.5.18', 'fixed_display':'4.5.18 / 5.2.3 or later' }, {'min_version':'4.6', 'fixed_version':'4.6.15', 'fixed_display':'4.6.15 / 5.2.3 or later' }, {'min_version':'4.7', 'fixed_version':'4.7.14', 'fixed_display':'4.7.14 / 5.2.3 or later' }, {'min_version':'4.8', 'fixed_version':'4.8.10', 'fixed_display':'4.8.10 / 5.2.3 or later' }, {'min_version':'4.9', 'fixed_version':'4.9.11', 'fixed_display':'4.9.11 / 5.2.3 or later' }, {'min_version':'5.0', 'fixed_version':'5.0.6', 'fixed_display':'5.0.6 / 5.2.3 or later' }, {'min_version':'5.1', 'fixed_version':'5.1.2', 'fixed_display':'5.1.2 / 5.2.3 or later' }, {'min_version':'5.2', 'fixed_version':'5.2.3'} ]; vcf::check_version_and_report( app_info:app_info, constraints:constraints, severity:SECURITY_WARNING, flags:{xss:TRUE} );
NASL family Debian Local Security Checks NASL id DEBIAN_DLA-1960.NASL description Several cross-site scripting (XSS) vulnerabilities were discovered in Wordpress, a popular content management framework. An attacker can use these flaws to send malicious scripts to an unsuspecting user. For Debian 8 last seen 2020-06-01 modified 2020-06-02 plugin id 130029 published 2019-10-18 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/130029 title Debian DLA-1960-1 : wordpress security update code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Debian Security Advisory DLA-1960-1. The text # itself is copyright (C) Software in the Public Interest, Inc. # include("compat.inc"); if (description) { script_id(130029); script_version("1.3"); script_cvs_date("Date: 2019/12/19"); script_cve_id("CVE-2019-16217", "CVE-2019-16218", "CVE-2019-16219", "CVE-2019-16220", "CVE-2019-16221", "CVE-2019-16222", "CVE-2019-16223"); script_name(english:"Debian DLA-1960-1 : wordpress security update"); script_summary(english:"Checks dpkg output for the updated packages."); script_set_attribute( attribute:"synopsis", value:"The remote Debian host is missing a security update." ); script_set_attribute( attribute:"description", value: "Several cross-site scripting (XSS) vulnerabilities were discovered in Wordpress, a popular content management framework. An attacker can use these flaws to send malicious scripts to an unsuspecting user. For Debian 8 'Jessie', these problems have been fixed in version 4.1.27+dfsg-0+deb8u1. We recommend that you upgrade your wordpress packages. NOTE: Tenable Network Security has extracted the preceding description block directly from the DLA security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://lists.debian.org/debian-lts-announce/2019/10/msg00023.html" ); script_set_attribute( attribute:"see_also", value:"https://packages.debian.org/source/jessie/wordpress" ); script_set_attribute(attribute:"solution", value:"Upgrade the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:N"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:wordpress"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:wordpress-l10n"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:wordpress-theme-twentyfifteen"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:wordpress-theme-twentyfourteen"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:wordpress-theme-twentythirteen"); script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:8.0"); script_set_attribute(attribute:"vuln_publication_date", value:"2019/09/11"); script_set_attribute(attribute:"patch_publication_date", value:"2019/10/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/10/18"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Debian Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l"); exit(0); } include("audit.inc"); include("debian_package.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian"); if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING); flag = 0; if (deb_check(release:"8.0", prefix:"wordpress", reference:"4.1.27+dfsg-0+deb8u1")) flag++; if (deb_check(release:"8.0", prefix:"wordpress-l10n", reference:"4.1.27+dfsg-0+deb8u1")) flag++; if (deb_check(release:"8.0", prefix:"wordpress-theme-twentyfifteen", reference:"4.1.27+dfsg-0+deb8u1")) flag++; if (deb_check(release:"8.0", prefix:"wordpress-theme-twentyfourteen", reference:"4.1.27+dfsg-0+deb8u1")) flag++; if (deb_check(release:"8.0", prefix:"wordpress-theme-twentythirteen", reference:"4.1.27+dfsg-0+deb8u1")) flag++; if (flag) { if (report_verbosity > 0) security_warning(port:0, extra:deb_report_get()); else security_warning(0); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
References
- https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
- https://core.trac.wordpress.org/changeset/45971
- https://github.com/WordPress/WordPress/commit/c86ee39ff4c1a79b93c967eb88522f5c09614a28
- https://wpvulndb.com/vulnerabilities/9863
- https://lists.debian.org/debian-lts-announce/2019/10/msg00023.html
- https://www.debian.org/security/2020/dsa-4599
- https://seclists.org/bugtraq/2020/Jan/8
- https://www.debian.org/security/2020/dsa-4677