Vulnerability Description
WordPress before 3.6.1 does not properly validate URLs before use in an HTTP redirect, which allows remote attackers to bypass intended redirection restrictions via a crafted string.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | <= 3.6 |
Related Weaknesses (CWE)
References
- http://codex.wordpress.org/Version_3.6.1Vendor Advisory
- http://core.trac.wordpress.org/changeset/25323ExploitPatch
- http://core.trac.wordpress.org/changeset/25324ExploitPatch
- http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116828.
- http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116832.
- http://lists.fedoraproject.org/pipermail/package-announce/2013-September/117118.
- http://seclists.org/fulldisclosure/2013/Dec/174
- http://wordpress.org/news/2013/09/wordpress-3-6-1/PatchVendor Advisory
- http://www.debian.org/security/2013/dsa-2757
- http://www.osvdb.org/101181
- http://codex.wordpress.org/Version_3.6.1Vendor Advisory
- http://core.trac.wordpress.org/changeset/25323ExploitPatch
- http://core.trac.wordpress.org/changeset/25324ExploitPatch
- http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116828.
- http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116832.
FAQ
What is CVE-2013-4339?
CVE-2013-4339 is a vulnerability with a CVSS score of 7.5 (HIGH). WordPress before 3.6.1 does not properly validate URLs before use in an HTTP redirect, which allows remote attackers to bypass intended redirection restrictions via a crafted string.
How severe is CVE-2013-4339?
CVE-2013-4339 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-4339?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress.