CVE-2010-4257: SQL Injection from trackback functions
Bug #716641 reported by
Mahyuddin Susanto
This bug affects 2 people
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
wordpress (Debian) |
Fix Released
|
Unknown
|
|||
wordpress (Fedora) |
Fix Released
|
Medium
|
|||
wordpress (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Lucid |
Fix Released
|
Undecided
|
Unassigned | ||
Maverick |
Fix Released
|
Undecided
|
Unassigned | ||
Natty |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Binary package hint: wordpress
SQL injection vulnerability in the do_trackbacks function in wp-includes/
authenticated users to execute arbitrary SQL commands via the Send Trackbacks field.
CVE References
visibility: | private → public |
tags: | added: patch |
Changed in wordpress (Ubuntu): | |
status: | New → Confirmed |
Changed in wordpress (Ubuntu Lucid): | |
status: | Confirmed → Fix Committed |
Changed in wordpress (Ubuntu Maverick): | |
status: | Confirmed → Fix Committed |
Changed in wordpress (Debian): | |
status: | Unknown → Fix Released |
Changed in wordpress (Fedora): | |
importance: | Unknown → Medium |
status: | Unknown → Fix Released |
To post a comment you must log in.
An improper input sanitization flaw was found in the way Wordpress
performed trackbacks (a way to notify a website when an entry that
references it is published) maintainance. A remote attacker,
with Author-level privilege could use this flaw to conduct
SQL injection attacks (gain further access to the site, which
should be otherwise prohibited).
References: bugs.debian. org/cgi- bin/bugreport. cgi?bug= 605603 codex.wordpress .org/Version_ 3.0.2
[1] http://
[2] http://
Upstream changeset: core.trac. wordpress. org/changeset/ 16625
[3] http://
Note: You may want to use w3m browser, when trying to access [2],
and [3], as we are having troubles / timeouts, when accessing
it via firefox / konqueror. Will post a copy of upstream patch
here.