Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-20042

Опубликовано: 27 дек. 2019
Источник: debian

Описание

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wordpressfixed5.3.2+dfsg1-1package
wordpressnot-affectedstretchpackage
wordpressnot-affectedjessiepackage

Примечания

  • https://core.trac.wordpress.org/changeset/46894/trunk

  • https://github.com/WordPress/wordpress-develop/commit/1f7f3f1f59567e2504f0fbebd51ccf004b3ccb1d

  • https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/

Связанные уязвимости

CVSS3: 6.1
ubuntu
больше 5 лет назад

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 6.1
nvd
больше 5 лет назад

In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release.

CVSS3: 6.1
github
около 3 лет назад

WordPress before 5.3.1 allowed an attacker to create a cross-site scripting attack (XSS) in well crafted links, because of an insufficient protection mechanism in wp_targeted_link_rel in wp-includes/formatting.php.

CVSS3: 4.7
fstec
почти 6 лет назад

Уязвимость функции wp_targeted_link_rel() системы управления содержимым сайта WordPress, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных