Name | CVE-2015-8834 |
Description | Cross-site scripting (XSS) vulnerability in wp-includes/wp-db.php in WordPress before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a long comment that is improperly stored because of limitations on the MySQL TEXT data type. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3440. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-633-1, DSA-3639-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
wordpress (PTS) | buster | 5.0.15+dfsg1-0+deb10u1 | fixed |
buster (security) | 5.0.21+dfsg1-0+deb10u1 | fixed | |
bullseye (security), bullseye | 5.7.8+dfsg1-0+deb11u2 | fixed | |
bookworm | 6.1.1+dfsg1-1 | fixed | |
sid, trixie | 6.5.2+dfsg1-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
wordpress | source | wheezy | 3.6.1+dfsg-1~deb7u12 | DLA-633-1 | ||
wordpress | source | jessie | 4.1+dfsg-1+deb8u9 | DSA-3639-1 | ||
wordpress | source | (unstable) | 4.2.2+dfsg-1 |
https://wordpress.org/news/2015/05/wordpress-4-2-2/
Follow-up patch from 4.2.1 -> 4.2.2 for wp-includes/wp-db.php seems not applied
This looks like a required patch: https://github.com/WordPress/WordPress/commit/a3a76fe665dfb62508a66542390a93445f1f7a59
Changes in wp-includes/wp-db.php: https://github.com/WordPress/WordPress/commit/db8f915ee6c236ee2f39e76781bf42367e3f1490
https://core.trac.wordpress.org/changeset/32387/
Wheezy: https://core.trac.wordpress.org/changeset/32391
Wheezy: https://core.trac.wordpress.org/changeset/32395
Wheezy: https://core.trac.wordpress.org/changeset/32423
Wheezy: https://core.trac.wordpress.org/changeset/32435