BUGTRAQ ID: 35935 CVE(CAN) ID: CVE-2009-2853,CVE-2009-2854 WordPress是一款免费的论坛Blog系统。 Wordpress没有检查用户对某些操作的权限,远程攻击者可以通过直接请求wp-admin/中的edit-comments.php、edit- pages.php、edit.php、edit-category-form.php、edit-link-category-form.php、 edit-tag-form.php、export.php、import.php或link-add.php执行非授权编辑或添加操作,或通过直接请求 admin-footer.php、edit-category-form.php、edit-form-advanced.php、edit- form-comment.php、edit-link-category-form.php、edit-link-form.php、edit- page-form.php或edit-tag-form.php获得管理权限提升。 WordPress < 2.8.3 厂商补丁: Debian ------ Debian已经为此发布了一个安全公告(DSA-1871-1)以及相应补丁: DSA-1871-1:New wordpress packages fix several vulnerabilities 链接:http://www.debian.org/security/2009/dsa-1871 补丁下载: Source archives: http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10-1etch4.diff.gz Size/MD5 checksum: 50984 45349b0822fc376b8cfef51b5cec3510 http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10.orig.tar.gz Size/MD5 checksum: 520314 e9d5373b3c6413791f864d56b473dd54...
BUGTRAQ ID: 35935 CVE(CAN) ID: CVE-2009-2853,CVE-2009-2854 WordPress是一款免费的论坛Blog系统。 Wordpress没有检查用户对某些操作的权限,远程攻击者可以通过直接请求wp-admin/中的edit-comments.php、edit- pages.php、edit.php、edit-category-form.php、edit-link-category-form.php、 edit-tag-form.php、export.php、import.php或link-add.php执行非授权编辑或添加操作,或通过直接请求 admin-footer.php、edit-category-form.php、edit-form-advanced.php、edit- form-comment.php、edit-link-category-form.php、edit-link-form.php、edit- page-form.php或edit-tag-form.php获得管理权限提升。 WordPress < 2.8.3 厂商补丁: Debian ------ Debian已经为此发布了一个安全公告(DSA-1871-1)以及相应补丁: DSA-1871-1:New wordpress packages fix several vulnerabilities 链接:http://www.debian.org/security/2009/dsa-1871 补丁下载: Source archives: http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10-1etch4.diff.gz Size/MD5 checksum: 50984 45349b0822fc376b8cfef51b5cec3510 http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10.orig.tar.gz Size/MD5 checksum: 520314 e9d5373b3c6413791f864d56b473dd54 http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10-1etch4.dsc Size/MD5 checksum: 607 d9389cbc71eee6f08b15762a97c9d537 Architecture independent packages: http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10-1etch4_all.deb Size/MD5 checksum: 521060 71a6aea482d0e7afb9c82701bef336e9 Debian GNU/Linux 5.0 alias lenny - -------------------------------- Debian (stable) - --------------- Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc. Source archives: http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.5.1-11+lenny1.dsc Size/MD5 checksum: 1051 46d9daad717f36918e2709757523f6eb http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.5.1.orig.tar.gz Size/MD5 checksum: 1181886 b1a40387006e54dcbd963d0cb5da0df4 http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.5.1-11+lenny1.diff.gz Size/MD5 checksum: 702119 07658ad36bed8829f58b1b6223eac294 Architecture independent packages: http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.5.1-11+lenny1_all.deb Size/MD5 checksum: 1029028 2d30e38e22761f87e23d2c85120bb1ff 补丁安装方法: 1. 手工安装补丁包: 首先,使用下面的命令来下载补丁软件: # wget url (url是补丁下载链接地址) 然后,使用下面的命令来安装补丁: # dpkg -i file.deb (file是相应的补丁名) 2. 使用apt-get自动安装补丁包: 首先,使用下面的命令更新内部数据库: # apt-get update 然后,使用下面的命令安装更新软件包: # apt-get upgrade WordPress --------- 目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载: http://wordpress.org/development/2009/08/wordpress-2-8-3-security-release/