Wordpress Multiple Vulnerabilities Fixed by 4.2.2


Description   Several cross-site scripting vulnerabilities were reported in Wordpress' core:
- located in the 'examples.html' HTML file of Genericons, an icon font package used in several themes and plugins. An authenticated remote attacker could exploit by inciting their victim into following a specially formed link in order to execute arbitrary Javascript or HTML code on the client side, with the browser rights.
- located in the visual editor.
An exploitation code is available for the vulnerability impacting Genericons.
The wordpress packages provided by Debian Jessie 8 are impacted by the CVE-2015-3429 vulnerability.
The de-wordpress, ja-wordpress, ru-wordpress, wordpress, zh-wordpress-zh_CH and zh-wordpress-zh_TW packages provided by FreeBSD are vulnerable.
Updated, 14/05/2015:
A proof of concept is available for Auberge and Modern themes.
Updated, 27/05/2015:
The Artificial Intelligence theme for Wordpress is impacted by the CVE-2015-3429 vulnerability.
     
Vulnerable Products   Vulnerable OS:
Fedora (Red Hat) - 20, 21, 22FreeBSD (FreeBSD)GNU/Linux (Debian) - 8Vulnerable Software:
WordPress (WordPress) - 4.2.1
     
Solution   Fixed wordpress packages for Debian Jessie 8 are available.
     
CVE   CVE-2015-3429
     
References   - Wordpress : 4.2.2 Security and Maintenance Release
https://wordpress.org/news/2015/05/wordpress-4-2-2/
DebianSecurityTracker : wordpress
https://security-tracker.debian.org/tracker/CVE-2015-3429
VuXML : wordpress -- 2 cross-site scripting vulnerabilities
http://www.vuxml.org/freebsd/d86890da-f498-11e4-99aa-bcaec565249c.html
- Wordpress : Jetpack by WordPress.com
https://wordpress.org/plugins/jetpack/changelog/
- Modern Theme <= 1.4.1
DOM Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/7986
Auberge Theme <= 1.4.4
DOM Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/7987
Syndication Links <= 1.0.2
DOM Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/7981
Indieweb Post Kinds <= 1.3.1
DOM Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/7982
- FEDORA-2015-6790 : Fedora 20 Update: wordpress-4.2.2-1.fc20
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158278.html
FEDORA-2015-6808 : Fedora 21 Update: wordpress-4.2.2-1.fc21
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158271.html
FEDORA-2015-7725 : Fedora 22 Update: wordpress-4.2.2-1.fc22
http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158773.html
- WPvulndb: Artificial Intelligence Theme <= 1.2.3
DOM Cross-Site Scripting (XSS)
https://wpvulndb.com/vulnerabilities/7994
- DSA 3328-1 : wordpress security update
http://lists.debian.org/debian-security-announce/debian-security-announce-2015/msg00224.html
DSA 3328-2 : wordpress regression update
http://lists.debian.org/debian-security-announce/debian-security-announce-2015/msg00225.html
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
XSS - Prevention - GET : suspicious 'iframe' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'meta' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious tag with event found in URL
3.2.0
XSS - Prevention - GET : suspicious 'applet' tag found in URL
3.2.0
XSS - Phishing : suspicious 'div' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' attribute found in URL
3.2.0
XSS - Prevention - GET : suspicious 'img' tag found in URL
3.2.0
XSS - Phishing : suspicious 'a' tag found in URL
3.2.0
XSS - Prevention - GET : cookie access attempt using script language found in URL
3.2.0
XSS - Prevention - GET : suspicious 'embed' tag found in URL
3.2.0
XSS - Prevention - GET : suspicious 'object' tag found in URL
3.2.0
XSS - Phishing : suspicious 'form' tag found in URL
3.2.0
XSS - Prevention - GET : javascript code found in URL
3.2.0
XSS - Prevention - GET : evasion attempt using tag characters encoding in URL
3.2.0
XSS - Prevention - GET : suspicious 'style' tag found in URL
3.2.0
XSS - Phishing : suspicious 'link' tag found in URL
3.2.0
XSS - Prevention - GET : 'script' tag found in URL
3.2.0
XSS - Prevention - GET : 'location' javascript object found in URL
3.2.0
XSS - Prevention - GET : suspicious 'div' tag found in URL
3.2.0
Wordpress : DOM-XSS in genericons package
5.0.0
     


 
 
 
 
 Risk level 
Low 

 Vulnerability First Public Report Date 
2015-05-07 

 Target Type 
Client 

 Possible exploit 
Remote