WordPress before 5.2.4 is vulnerable to poisoning of the cache of JSON GET requests because certain requests lack a Vary: Origin header.
References
Link | Resource |
---|---|
https://core.trac.wordpress.org/changeset/46478 | Patch Vendor Advisory |
https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html | Third Party Advisory |
https://github.com/WordPress/WordPress/commit/b224c251adfa16a5f84074a3c0886270c9df38de | Patch Third Party Advisory |
https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/ | Release Notes Vendor Advisory |
https://wpvulndb.com/vulnerabilities/9911 | Third Party Advisory |
https://www.debian.org/security/2020/dsa-4599 | Third Party Advisory |
https://seclists.org/bugtraq/2020/Jan/8 | Mailing List Third Party Advisory |
https://www.debian.org/security/2020/dsa-4677 | Third Party Advisory |
Information
Published : 2019-10-17 06:15
Updated : 2022-03-31 10:51
NVD link : CVE-2019-17673
Mitre link : CVE-2019-17673
JSON object : View
CWE
Products Affected
debian
- debian_linux
wordpress
- wordpress