![]() |
Wordpress 3.0.4 XSS critical update
http://wordpress.org/news/2010/12/3-0-4-update/
Quote:
|
Do you have a sense of what the vulnerability is? Have you seen or heard of anything exploited yet?
|
I haven't pulled down 3.0.3 and 3.0.4 yet to see what they changed. I've never understood why anyone tries to clean up data... if it doesn't match your validation, it should be declined.
I suspect the error might be in the commenting or post section as that is the only place that library seems to be called - so, if your blog doesn't have comments, it may not be vulnerable. However, it could be in the user's bio field, and an admin that views a users profile could leak the admin cookie. I'll take a look later, just seemed prudent to let people know earlier rather than later. :) |
Good info. Thanks for the heads up! Updating my WP sites now...
|
changeset
http://core.trac.wordpress.org/chang...2/branches/3.0 basically, anywhere someone can enter input that might contain html.. comments, bio, posts, etc. can be exploited. |
Damn, you gotta be some sort of frikking genius or savant to understand that page.
But sounds fucked up. What happens if you have comments set to approve only? Does the exploit still get you? |
Would this exploit apply to older versions of WP?
|
I believe based on what they changed, that almost every version of wordpress is vulnerable. KSES was their 'end-all be-all' solution to html sanitization, and, it has a pretty big hole. Any place you can enter text, that could potentially include html, would be possible to exploit. While |