WordPress Fixes Critical PHP Object Injection Issue Leading to Code Execution
#1
Quote:The latest WordPress security release fixes a remotely exploitable PHP object injection issue with a 10.0 Critical base score possibly allowing remote attackers to execute arbitrary code on the targeted system.

"Sam Thomas discovered that contributors could craft meta data in a way that resulted in PHP object injection," says the Wordpress team.

According to The OWASP Foundation, "PHP Object Injection is an application level vulnerability that could allow an attacker to perform different kinds of malicious attacks, such as Code Injection, SQL Injection, Path Traversal and Application Denial of Service, depending on the context."

This type of vulnerability resides in the improper sanitization of user input before it's being passed for processing to the unserialize() PHP function.

In the case of the security issue fixed in the WordPress 5.0.1 release, potential attackers that successfully compromise a target system could execute arbitrary code.
All WordPress users are advised to update to the 5.0.1 version to block possible attacks that could lead to a PHP object injection condition.

Source: https://news.softpedia.com/news/wordpres...4272.shtml
[-] The following 1 user says Thank You to silversurfer for this post:
  • harlan4096
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
KeePass 2.61
KeePass 2.61 KeePa...harlan4096 — 16:59
Vivaldi 7.8 Build 3925.76
Vivaldi 7.8 Build ...harlan4096 — 16:57
HWiNFO v8.44
HWiNFO v8.44 Re...harlan4096 — 16:57
Apple MacBook Neo launches with A18 Pro,...
MacBook Neo is App...harlan4096 — 16:55
Leaked iPhone Spyware ‘Coruna’ Now Steal...
Security researche...harlan4096 — 16:54

[-]
Birthdays
Today's Birthdays
avatar (41)ARYsahulatbazar
Upcoming Birthdays
avatar (44)gapedDow
avatar (38)snorydar
avatar (43)Hectorvot
avatar (51)knowhanPluts
avatar (39)Williamengiz
avatar (46)qaqapeti
avatar (44)battsourIonix
avatar (43)CedricSek
avatar (39)chasRex
avatar (43)slavrProck
avatar (45)Tyesharaike
avatar (49)TomeRerla
avatar (45)walllMIZ
avatar (41)oconyho
avatar (33)uteluxix
avatar (47)piafcflene
avatar (39)Matthewkah
avatar (51)tersfargum
avatar (50)alfreExept
avatar (38)Charlesfibre
avatar (42)napasvem
avatar (44)diploJeoca
avatar (38)francisnj3
avatar (43)artmaGoork
avatar (45)tukraNax
avatar (41)RichardCisee
avatar (40)ebenofit
avatar (38)ykazawu

[-]
Online Staff
There are no staff members currently online.

>