漏洞信息详情
WordPress 跨站脚本漏洞
- CNNVD编号:CNNVD-201909-553
- 危害等级: 中危
- CVE编号: CVE-2019-16223
- 漏洞类型: 跨站脚本
- 发布时间: 2019-09-11
- 威胁类型: 远程
- 更新时间: 2021-01-05
- 厂 商:
- 漏洞来源: gx1,Debian
漏洞简介
WordPress是WordPress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。
WordPress 5.2.3之前版本中存在跨站脚本漏洞。该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
参考网址
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2019/10/msg00023.HTML
来源:MISC
链接:https://wpvulndb.com/vulnerabilities/9862
来源:BUGTRAQ
链接:https://seclists.org/bugtraq/2020/Jan/8
来源:wordpress.org
链接:https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/
来源:MISC
链接:https://packetstormsecurity.com/files/160745/WordPress-Core-5.2.2-Cross-Site-Scripting.HTML
来源:DEBIAN
链接:https://www.debian.org/security/2020/dsa-4599
来源:DEBIAN
链接:https://www.debian.org/security/2020/dsa-4677
来源:lists.debian.org
链接:https://lists.debian.org/debian-lts-announce/2019/10/msg00023.HTML
来源:www.debian.org
链接:https://www.debian.org/security/2020/dsa-4599
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.3902/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.0069/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.1606/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/160745/WordPress-Core-5.2.2-Cross-Site-Scripting.HTML
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/155880/Debian-Security-Advisory-4599-1.HTML
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2019-16223
来源:www.exploit-db.com
链接:https://www.exploit-db.com/exploits/49338
受影响实体
暂无
补丁
- WordPress 跨站脚本漏洞的修复措施
评论