Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-11029

Опубликовано: 30 апр. 2020
Источник: debian

Описание

In affected versions of WordPress, a vulnerability in the stats() method of class-wp-object-cache.php can be exploited to execute cross-site scripting (XSS) attacks. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wordpressfixed5.4.1+dfsg1-1package

Примечания

  • https://github.com/WordPress/wordpress-develop/security/advisories/GHSA-568w-8m88-8g2c

  • https://wordpress.org/support/wordpress-version/version-5-4-1/#security-updates

  • https://core.trac.wordpress.org/changeset/47637

  • https://github.com/WordPress/wordpress-develop/935ab39e8ee754735a553c74d41270df1164ae56 (master)

Связанные уязвимости

CVSS3: 5.8
ubuntu
около 5 лет назад

In affected versions of WordPress, a vulnerability in the stats() method of class-wp-object-cache.php can be exploited to execute cross-site scripting (XSS) attacks. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).

CVSS3: 5.8
nvd
около 5 лет назад

In affected versions of WordPress, a vulnerability in the stats() method of class-wp-object-cache.php can be exploited to execute cross-site scripting (XSS) attacks. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33).

CVSS3: 6.1
fstec
около 5 лет назад

Уязвимость метода stats() (class-wp-object-cache.php) системы управления содержимым сайта WordPress, позволяющая нарушителю оказать воздействие на целостность данных