In WordPress before 4.9.9 and 5.x before 5.0.1, when the Apache HTTP Server is used, authors could upload crafted files that bypass intended MIME type restrictions, leading to XSS, as demonstrated by a .jpg file without JPEG data.
References
Link | Resource |
---|---|
https://wordpress.org/news/2018/12/wordpress-5-0-1-security-release/ | Vendor Advisory Release Notes |
https://github.com/WordPress/WordPress/commit/246a70bdbfac3bd45ff71c7941deef1bb206b19a | Patch Third Party Advisory |
https://www.zdnet.com/article/wordpress-plugs-bug-that-led-to-google-indexing-some-user-passwords/ | Press/Media Coverage Third Party Advisory |
https://wordpress.org/support/wordpress-version/version-5-0-1/ | Release Notes Vendor Advisory |
https://codex.wordpress.org/Version_4.9.9 | Product Vendor Advisory |
https://wpvulndb.com/vulnerabilities/9175 | Vendor Advisory |
http://www.securityfocus.com/bid/106220 | Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2019/02/msg00019.html | Mailing List Third Party Advisory |
https://www.debian.org/security/2019/dsa-4401 | Third Party Advisory |
Information
Published : 2018-12-14 12:29
Updated : 2019-03-04 06:20
NVD link : CVE-2018-20149
Mitre link : CVE-2018-20149
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
debian
- debian_linux
wordpress
- wordpress