Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2014.0040 WordPress 3.8.2 Security Release 9 April 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: WordPress Operating System: UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Execute Arbitrary Code/Commands -- Existing Account Increased Privileges -- Existing Account Cross-site Scripting -- Remote with User Interaction Unauthorised Access -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2014-0166 CVE-2014-0165 Member content until: Friday, May 9 2014 OVERVIEW A number of security vulnerabilities have been identified in WordPress prior to version 3.8.2. [1] IMPACT The vendor has provided the following details regarding these vulnerabilities: "This releases fixes a weakness that could let an attacker force their way into your site by forging authentication cookies. This was discovered and fixed by Jon Cave of the WordPress security team. It also contains a fix to prevent a user with the Contributor role from improperly publishing posts. Reported by edik. This release also fixes nine bugs and contains three other security hardening changes: - Pass along additional information when processing pingbacks to help hosts identify potentially abusive requests. - Fix a low-impact SQL injection by trusted users. Reported by Tom Adams of dxw. - Prevent possible cross-domain scripting through Plupload, the third-party library WordPress uses for uploading files. Reported by Szymon Gruszecki." [1, 2] MITIGATION The vendor recommends that administrators update to the latest version of WordPress to correct these issues. [1] REFERENCES [1] WordPress 3.8.2 Security Release http://wordpress.org/news/2014/04/wordpress-3-8-2/ [2] Version 3.8.2 http://codex.wordpress.org/Version_3.8.2 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBU0TCUxLndAQH1ShLAQJCJQ/+Op9AeHVQFR5u59s8nWsnvx/uDSnxZB0q 7gfGlKLwc95c6zwkaAOOs4a+E0Mcn4rQxR0OI5R1GCuDcIiY8b3Ew1qkhVQSbyAf rmT98czOtb9nxcQLD2KG6T+hzQlRUe5YlIP9Ebwc1a3nfwF0hPH5+IilC5MC7+Rb RVSR/01QFnF92unz8EXt8gBZr2//tvfJU772qfTTT4tINHR2hgEqDqGfq2Wka5d1 URu23d3c80Bfgh8VjsvKkHrybu/yaKOcO4FjktQ4JS2cWuX8SBU1xpdcgc/gsUSq 60tFBqmVEwrbyfRVHN56qS06O3jEQl03n4y6ow0l0/iwq3Pqhyv3ymK0UG+wfLqD mAfIcM3DQj3zwW76UbFiJU4ueupPwPNzGyT+WpWklVnkN+hvnqmG4nXBbn5DQDF8 YR7ySjAN6w+kG0XJQqxrsJ6O7x7KOr8uYEAJkz2KHZwQ3tHMy49YbJaIp8K4s8Wb JQwFKnn0d/f7FLkid17EkDB1/yJr8l64XcQ6Wk/7WFhapBYn7euJhb6GdxIWd9Do BUflkn6UXmk2rgvp9VH1xO7A4Hi3qzIj9Lz5WjCBhQ3Oi7FLtE/UOYdtL41RkSBj hRGS3QrNrzRglHv/mXzM0ZFkcutHe/Yw1lC2NeZcavSwsQgrkcXqdr6DoFlevT7j WicVzLKfUBA= =4YRX -----END PGP SIGNATURE-----