安全研究

安全漏洞
WordPress wp-admin非授权管理访问漏洞

发布日期:2009-08-04
更新日期:2009-08-31

受影响系统:
WordPress WordPress < 2.8.3
不受影响系统:
WordPress WordPress 2.8.3
描述:
BUGTRAQ  ID: 35935
CVE(CAN) ID: CVE-2009-2853,CVE-2009-2854

WordPress是一款免费的论坛Blog系统。

Wordpress没有检查用户对某些操作的权限,远程攻击者可以通过直接请求wp-admin/中的edit-comments.php、edit-pages.php、edit.php、edit-category-form.php、edit-link-category-form.php、edit-tag-form.php、export.php、import.php或link-add.php执行非授权编辑或添加操作,或通过直接请求admin-footer.php、edit-category-form.php、edit-form-advanced.php、edit-form-comment.php、edit-link-category-form.php、edit-link-form.php、edit-page-form.php或edit-tag-form.php获得管理权限提升。

<*来源:Alex Legler
  
  链接:http://www.openwall.com/lists/oss-security/2009/08/04/5
        http://www.debian.org/security/2009/dsa-1871
*>

建议:
厂商补丁:

Debian
------
Debian已经为此发布了一个安全公告(DSA-1871-1)以及相应补丁:
DSA-1871-1:New wordpress packages fix several vulnerabilities
链接:http://www.debian.org/security/2009/dsa-1871

补丁下载:

Source archives:

http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10-1etch4.diff.gz
Size/MD5 checksum:    50984 45349b0822fc376b8cfef51b5cec3510
http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10.orig.tar.gz
Size/MD5 checksum:   520314 e9d5373b3c6413791f864d56b473dd54
http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10-1etch4.dsc
Size/MD5 checksum:      607 d9389cbc71eee6f08b15762a97c9d537

Architecture independent packages:

http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.0.10-1etch4_all.deb
Size/MD5 checksum:   521060 71a6aea482d0e7afb9c82701bef336e9


Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Debian (stable)
- ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.5.1-11+lenny1.dsc
Size/MD5 checksum:     1051 46d9daad717f36918e2709757523f6eb
http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.5.1.orig.tar.gz
Size/MD5 checksum:  1181886 b1a40387006e54dcbd963d0cb5da0df4
http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.5.1-11+lenny1.diff.gz
Size/MD5 checksum:   702119 07658ad36bed8829f58b1b6223eac294

Architecture independent packages:

http://security.debian.org/pool/updates/main/w/wordpress/wordpress_2.5.1-11+lenny1_all.deb
Size/MD5 checksum:  1029028 2d30e38e22761f87e23d2c85120bb1ff

补丁安装方法:

1. 手工安装补丁包:

  首先,使用下面的命令来下载补丁软件:
  # wget url  (url是补丁下载链接地址)

  然后,使用下面的命令来安装补丁:  
  # dpkg -i file.deb (file是相应的补丁名)

2. 使用apt-get自动安装补丁包:

   首先,使用下面的命令更新内部数据库:
   # apt-get update
  
   然后,使用下面的命令安装更新软件包:
   # apt-get upgrade

WordPress
---------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:

http://wordpress.org/development/2009/08/wordpress-2-8-3-security-release/

浏览次数:2794
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障