|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
WordPress Core: six vulnerabilities
Synthesis of the vulnerability
An attacker can use several vulnerabilities of WordPress.
Impacted products: Debian, Fedora, WordPress Core.
Creation date: 17/05/2017.
Identifiers: CERTFR-2017-AVI-157, CVE-2017-9061, CVE-2017-9062, CVE-2017-9063, CVE-2017-9064, CVE-2017-9065, CVE-2017-9066, DLA-975-1, DSA-3870-1, FEDORA-2017-46fcfd8c98, FEDORA-2017-d968f5a95f, FEDORA-2017-fe7c3c9c30, VIGILANCE-VUL-22750.
Description of the vulnerability
Several vulnerabilities were announced in WordPress.
An attacker can deceive the user via HTTP Class, in order to redirect him to a malicious site. [severity:1/4; CVE-2017-9066]
An attacker can bypass security features via XML-RPC API, in order to obtain sensitive information. [severity:2/4; CVE-2017-9065]
An attacker can bypass security features via XML-RPC API, in order to escalate his privileges. [severity:2/4; CVE-2017-9062]
An attacker can trigger a Cross Site Request Forgery via Filesystem Credentials Dialog, in order to force the victim to perform operations (VIGILANCE-VUL-22527). [severity:2/4; CVE-2017-9064]
Complete Vigil@nce bulletin.... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides software vulnerability bulletins. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.