SB2023101632 - Fedora 39 update for wordpress



SB2023101632 - Fedora 39 update for wordpress

Published: October 16, 2023 Updated: May 13, 2024

Security Bulletin ID SB2023101632
Severity
High
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

High 14% Medium 43% Low 43%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Stored cross-site scripting (CVE-ID: CVE-2023-38000)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the post link navigation block. A remote user can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.


2) Improper access control (CVE-ID: CVE-2023-39999)

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and read comments on private and password protected posts.


3) Information disclosure (CVE-ID: CVE-2023-5561)

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the "/wp-json/wp/v2/users" REST API endpoin. A remote attacker can disclose email addresses of WordPress users by probing them character by character.


4) Stored cross-site scripting (CVE-ID: N/A)

The disclosed vulnerability allows a remote user to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data in the footnotes block. A remote user can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


5) Cross-site scripting (CVE-ID: N/A)

The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.

The vulnerability exists due to insufficient sanitization of user-supplied data passed via success_url and reject_url parameters in the application password screen. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


6) Code Injection (CVE-ID: N/A)

The vulnerability allows a remote user to execute arbitrary shortcodes.

The vulnerability exists due to improper input validation. A remote user can bypass implemented security restrictions and execute arbitrary shortcodes on the website.


7) Deserialization of Untrusted Data (CVE-ID: N/A)

The vulnerability allows a remote user to execute arbitrary code on the target system.

The vulnerability exists due to insecure input validation when processing serialized data. A remote user can pass specially crafted data to the application and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install update from vendor's website.