SB2018121308 - Multiple vulnerabilities in WordPress
Published: December 13, 2018 Updated: September 25, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Security restrictions bypass (CVE-ID: CVE-2018-20147)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to unspecified flaw. A remote attacker can bypass security restrictions and alter meta data to delete files that he wasn't authorized to.
2) Security restrictions bypass (CVE-ID: CVE-2018-20152)
The vulnerability allows a remote attacker to bypass security restrictions on the target system.The weakness exists due to unspecified flaw. A remote attacker can bypass security restrictions and create posts of unauthorized post types with specially crafted input.
3) PHP object injection (CVE-ID: CVE-2018-20148)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists due to PHP object injection. A remote attacker can craft meta data in a way that resulted in PHP object injection and arbitrary code execution.
4) Stored cross-site scripting (CVE-ID: CVE-2018-20153)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can edit new comments from higher-privileged users, trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
5) Cross-site scripting (CVE-ID: CVE-2018-20150)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
6) Cross-site scripting (CVE-ID: CVE-2018-20149)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker on Apache-hosted sites can upload specifically crafted files that bypass MIME verification, trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
7) Information disclosure (CVE-ID: CVE-2018-20151)
The vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists due to the user activation screen can be indexed by search engines in some uncommon configurations. A remote attacker can access email addresses, and in some rare cases, default generated passwords.
Remediation
Install update from vendor's website.