The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

vulnerability CVE-2017-9061 CVE-2017-9062 CVE-2017-9063

WordPress Core: six vulnerabilities

Synthesis of the vulnerability

An attacker can use several vulnerabilities of WordPress.
Impacted products: Debian, Fedora, WordPress Core.
Severity: 2/4.
Creation date: 17/05/2017.
Identifiers: CERTFR-2017-AVI-157, CVE-2017-9061, CVE-2017-9062, CVE-2017-9063, CVE-2017-9064, CVE-2017-9065, CVE-2017-9066, DLA-975-1, DSA-3870-1, FEDORA-2017-46fcfd8c98, FEDORA-2017-d968f5a95f, FEDORA-2017-fe7c3c9c30, VIGILANCE-VUL-22750.

Description of the vulnerability

Several vulnerabilities were announced in WordPress.

An attacker can deceive the user via HTTP Class, in order to redirect him to a malicious site. [severity:1/4; CVE-2017-9066]

An attacker can bypass security features via XML-RPC API, in order to obtain sensitive information. [severity:2/4; CVE-2017-9065]

An attacker can bypass security features via XML-RPC API, in order to escalate his privileges. [severity:2/4; CVE-2017-9062]

An attacker can trigger a Cross Site Request Forgery via Filesystem Credentials Dialog, in order to force the victim to perform operations (VIGILANCE-VUL-22527). [severity:2/4; CVE-2017-9064]

An attacker can trigger a Cross Site Scripting via Large Files Upload, in order to run JavaScript code in the context of the web site. [severity:2/4; CVE-2017-9061]

An attacker can trigger a Cross Site Scripting via Customizer, in order to run JavaScript code in the context of the web site. [severity:2/4; CVE-2017-9063]
Complete Vigil@nce bulletin.... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides software vulnerability bulletins. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.