Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-6819

Опубликовано: 12 мар. 2017
Источник: debian
EPSS Низкий

Описание

In WordPress before 4.7.3, there is cross-site request forgery (CSRF) in Press This (wp-admin/includes/class-wp-press-this.php), leading to excessive use of server resources. The CSRF can trigger an outbound HTTP request for a large file that is then parsed by Press This.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wordpressfixed4.7.3+dfsg-1package
wordpressnot-affectedjessiepackage
wordpressnot-affectedwheezypackage

Примечания

  • https://wordpress.org/news/2017/03/wordpress-4-7-3-security-and-maintenance-release/

  • https://github.com/WordPress/WordPress/commit/263831a72d08556bc2f3a328673d95301a152829

EPSS

Процентиль: 92%
0.0818
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 8 лет назад

In WordPress before 4.7.3, there is cross-site request forgery (CSRF) in Press This (wp-admin/includes/class-wp-press-this.php), leading to excessive use of server resources. The CSRF can trigger an outbound HTTP request for a large file that is then parsed by Press This.

CVSS3: 6.5
nvd
больше 8 лет назад

In WordPress before 4.7.3, there is cross-site request forgery (CSRF) in Press This (wp-admin/includes/class-wp-press-this.php), leading to excessive use of server resources. The CSRF can trigger an outbound HTTP request for a large file that is then parsed by Press This.

CVSS3: 6.5
github
около 3 лет назад

In WordPress before 4.7.3, there is cross-site request forgery (CSRF) in Press This (wp-admin/includes/class-wp-press-this.php), leading to excessive use of server resources. The CSRF can trigger an outbound HTTP request for a large file that is then parsed by Press This.

EPSS

Процентиль: 92%
0.0818
Низкий