oss-sec mailing list archives
CVE Request - Wordpress 3.5 Full-path disclosure vulnerability
From: Henrique <typoon () gmail com>
Date: Sun, 20 Jan 2013 18:18:13 -0200
Hello, This is a request for a CVE for an issue with Wordpress 3.5 (and probably earlier versions) that allows a full-path disclosure. The issue can be reproduced by accessing the URL as follows: http://wordpress_site/?s[]=1 producing the error: Warning: stripslashes() expects parameter 1 to be string, array given in /home/gilgamesh/security/wpress/wp-includes/query.php on line 2184 Before sanitizing the input, the variables passed should be validated that they have the correct type in order to avoid such issues. The wordpress team has already been notified and say they will look into the code to improve it. Regards, Henrique
Current thread:
- CVE Request - Wordpress 3.5 Full-path disclosure vulnerability Henrique (Jan 20)
- Re: CVE Request - Wordpress 3.5 Full-path disclosure vulnerability Kurt Seifried (Jan 20)
- Re: CVE Request - Wordpress 3.5 Full-path disclosure vulnerability Agostino Sarubbo (Jan 21)
- Re: CVE Request - Wordpress 3.5 Full-path disclosure vulnerability Henrique Montenegro (Jan 21)
- Re: CVE Request - Wordpress 3.5 Full-path disclosure vulnerability Giles Coochey (Jan 21)
- Re: CVE Request - Wordpress 3.5 Full-path disclosure vulnerability Henri Salo (Jan 21)
- Re: CVE Request - Wordpress 3.5 Full-path disclosure vulnerability Henrique Montenegro (Jan 21)
- Re: CVE Request - Wordpress 3.5 Full-path disclosure vulnerability Kurt Seifried (Jan 21)
- Whats worth a CVE? Scott Herbert (Jan 21)
- Re: Whats worth a CVE? Eitan Adler (Jan 21)
- Re: Whats worth a CVE? Kurt Seifried (Jan 21)
- Re: CVE Request - Wordpress 3.5 Full-path disclosure vulnerability Agostino Sarubbo (Jan 21)
- Re: CVE Request - Wordpress 3.5 Full-path disclosure vulnerability Kurt Seifried (Jan 20)