Name | CVE-2015-8834 |
Description | Cross-site scripting (XSS) vulnerability in wp-includes/wp-db.php in WordPress before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a long comment that is improperly stored because of limitations on the MySQL TEXT data type. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3440. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-633-1, DSA-3639-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
wordpress (PTS) | buster | 5.0.15+dfsg1-0+deb10u1 | fixed |
| buster (security) | 5.0.20+dfsg1-0+deb10u1 | fixed |
| bullseye (security), bullseye | 5.7.8+dfsg1-0+deb11u2 | fixed |
| bookworm | 6.1.1+dfsg1-1 | fixed |
| trixie | 6.3.2+dfsg1-1 | fixed |
| sid | 6.4.1+dfsg1-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://wordpress.org/news/2015/05/wordpress-4-2-2/
Follow-up patch from 4.2.1 -> 4.2.2 for wp-includes/wp-db.php seems not applied
This looks like a required patch: https://github.com/WordPress/WordPress/commit/a3a76fe665dfb62508a66542390a93445f1f7a59
Changes in wp-includes/wp-db.php: https://github.com/WordPress/WordPress/commit/db8f915ee6c236ee2f39e76781bf42367e3f1490
https://core.trac.wordpress.org/changeset/32387/
Wheezy: https://core.trac.wordpress.org/changeset/32391
Wheezy: https://core.trac.wordpress.org/changeset/32395
Wheezy: https://core.trac.wordpress.org/changeset/32423
Wheezy: https://core.trac.wordpress.org/changeset/32435