blob: b72044ef11cfcb851f452ad5bad5df59e97800ea [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200410-12">
<title>WordPress: HTTP response splitting and XSS vulnerabilities</title>
WordPress contains HTTP response splitting and cross-site scripting
<product type="ebuild">wordpress</product>
<announced>October 14, 2004</announced>
<revised>May 22, 2006: 04</revised>
<package name="www-apps/wordpress" auto="yes" arch="*">
<unaffected range="ge">1.2.2</unaffected>
<vulnerable range="lt">1.2.2</vulnerable>
WordPress is a PHP and MySQL based content management and publishing
Due to the lack of input validation in the administration panel
scripts, WordPress is vulnerable to HTTP response splitting and
cross-site scripting attacks.
<impact type="low">
A malicious user could inject arbitrary response data, leading to
content spoofing, web cache poisoning and other cross-site scripting or
HTTP response splitting attacks. This could result in compromising the
victim's data or browser.
There is no known workaround at this time.
All WordPress users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-apps/wordpress-1.2.2&quot;</code>
<uri link="">WordPress 1.2.2 Release Notes</uri>
<uri link="">CVE-2004-1584</uri>
<metadata tag="requester" timestamp="Tue, 12 Oct 2004 11:43:21 +0000">
<metadata tag="bugReady" timestamp="Tue, 12 Oct 2004 11:44:27 +0000">
<metadata tag="submitter" timestamp="Tue, 12 Oct 2004 21:40:26 +0000">