| Vulnerability Name: | CVE-2017-17092 (CCN-135825) | ||||||||||||||||||||||||||||||||||||||||
| Assigned: | 2017-11-29 | ||||||||||||||||||||||||||||||||||||||||
| Published: | 2017-11-29 | ||||||||||||||||||||||||||||||||||||||||
| Updated: | 2019-04-26 | ||||||||||||||||||||||||||||||||||||||||
| Summary: | wp-includes/functions.php in WordPress before 4.9.1 does not require the unfiltered_html capability for upload of .js files, which might allow remote attackers to conduct XSS attacks via a crafted file. | ||||||||||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 5.4 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) 5.2 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
5.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:H/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 3.5 Low (CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N)
| ||||||||||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-79 | ||||||||||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Cross-Site Scripting | ||||||||||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2017-17092 Source: BID Type: Third Party Advisory, VDB Entry 102024 Source: CCN Type: BID-102024 WordPress Prior to 4.9.1 Multiple Security Vulnerabilities Source: MISC Type: Patch, Release Notes, Vendor Advisory https://codex.wordpress.org/Version_4.9.1 Source: XF Type: UNKNOWN wp-core-cve201717092-xss(135825) Source: MISC Type: Patch, Third Party Advisory https://github.com/WordPress/WordPress/commit/67d03a98c2cae5f41843c897f206adde299b0509 Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20171221 [SECURITY] [DLA 1216-1] wordpress security update Source: CCN Type: WordPress Web site WordPress 4.9.1 Security and Maintenance Release Source: MISC Type: Release Notes, Vendor Advisory https://wordpress.org/news/2017/11/wordpress-4-9-1-security-and-maintenance-release/ Source: MISC Type: Third Party Advisory, VDB Entry https://wpvulndb.com/vulnerabilities/8966 Source: DEBIAN Type: Third Party Advisory DSA-4090 | ||||||||||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||||||||||