WordPress Wp-login.PHP HTTP响应拆分漏洞

漏洞信息详情

WordPress Wp-login.PHP HTTP响应拆分漏洞

漏洞简介

WordPress 1.2版本的wp-login.php存在CRLF注入漏洞。远程攻击者可以借助文本参数进行HTTP响应拆分攻击,修改服务器预定HTML内容。

漏洞公告

Gentoo Linux has released advisory GLSA 200410-12 dealing with this issue. they have advised that all WordPress users should upgrade to the latest version:
# emerge sync
# emerge -pv “>=www-apps/wordpress-1.2.1”
# emerge “>=www-apps/wordpress-1.2.1”
For more information please see the referenced Gentoo advisory.
The vendor has released WordPress version 1.2.1 to address this issue.
WordPress WordPress 1.2

参考网址

来源: BID
名称: 11348
链接:http://www.securityfocus.com/bid/11348

来源: GENTOO
名称: GLSA-200410-12
链接:http://www.gentoo.org/security/en/glsa/glsa-200410-12.xml

来源: wordpress.org
链接:http://wordpress.org/development/2004/10/wp-121/

来源: SECUNIA
名称: 12773
链接:http://secunia.com/advisories/12773

来源: BUGTRAQ
名称: 20041006 HTTP Response Splitting Vulnerability in WordPress 1.2
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=109716327724041&w=2

来源: XF
名称: wordpress-response-splitting(17649)
链接:http://xforce.iss.net/xforce/xfdb/17649

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享