安全研究
安全漏洞
WordPress wp-admin非授权管理访问漏洞
发布日期:2009-08-04
更新日期:2009-08-31
受影响系统:
WordPress WordPress < 2.8.3不受影响系统:
WordPress WordPress 2.8.3描述:
BUGTRAQ ID: 35935
CVE(CAN) ID: CVE-2009-2853,CVE-2009-2854
WordPress是一款免费的论坛Blog系统。
Wordpress没有检查用户对某些操作的权限,远程攻击者可以通过直接请求wp-admin/中的edit-comments.php、edit-pages.php、edit.php、edit-category-form.php、edit-link-category-form.php、edit-tag-form.php、export.php、import.php或link-add.php执行非授权编辑或添加操作,或通过直接请求admin-footer.php、edit-category-form.php、edit-form-advanced.php、edit-form-comment.php、edit-link-category-form.php、edit-link-form.php、edit-page-form.php或edit-tag-form.php获得管理权限提升。
<*来源:Alex Legler
链接:http://www.openwall.com/lists/oss-security/2009/08/04/5
http://www.debian.org/security/2009/dsa-1871
*>
建议:
厂商补丁:
Debian
------
Debian已经为此发布了一个安全公告(DSA-1871-1)以及相应补丁:
DSA-1871-1:New wordpress packages fix several vulnerabilities
链接:http://www.debian.org/security/2009/dsa-1871
补丁下载:
Source archives:
http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10-1etch4.diff.gz
Size/MD5 checksum: 50984 45349b0822fc376b8cfef51b5cec3510
http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10.orig.tar.gz
Size/MD5 checksum: 520314 e9d5373b3c6413791f864d56b473dd54
http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10-1etch4.dsc
Size/MD5 checksum: 607 d9389cbc71eee6f08b15762a97c9d537
Architecture independent packages:
http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10-1etch4_all.deb
Size/MD5 checksum: 521060 71a6aea482d0e7afb9c82701bef336e9
Debian GNU/Linux 5.0 alias lenny
- --------------------------------
Debian (stable)
- ---------------
Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.5.1-11+lenny1.dsc
Size/MD5 checksum: 1051 46d9daad717f36918e2709757523f6eb
http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.5.1.orig.tar.gz
Size/MD5 checksum: 1181886 b1a40387006e54dcbd963d0cb5da0df4
http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.5.1-11+lenny1.diff.gz
Size/MD5 checksum: 702119 07658ad36bed8829f58b1b6223eac294
Architecture independent packages:
http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.5.1-11+lenny1_all.deb
Size/MD5 checksum: 1029028 2d30e38e22761f87e23d2c85120bb1ff
补丁安装方法:
1. 手工安装补丁包:
首先,使用下面的命令来下载补丁软件:
# wget url (url是补丁下载链接地址)
然后,使用下面的命令来安装补丁:
# dpkg -i file.deb (file是相应的补丁名)
2. 使用apt-get自动安装补丁包:
首先,使用下面的命令更新内部数据库:
# apt-get update
然后,使用下面的命令安装更新软件包:
# apt-get upgrade
WordPress
---------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
http://wordpress.org/development/2009/08/wordpress-2-8-3-security-release/
浏览次数:2794
严重程度:0(网友投票)
绿盟科技给您安全的保障
