WordPress possilbe SQL injections [was: SELinux - way of the future or good idea but !!!]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]



Hello Jerry,

On Thu, 2010-12-02 at 15:34 -0800, Jerry Franz wrote:
> And in an exact example of this, today I needed to update some WordPress 
> (WP) installations. Only, for "some reason" the FTP based autoupdater 
> didn't work today.

Do you feel comfortable letting a web application update itself using
FTP or even SSH credentials?

http://wordpress.org/support/topic/filesystem-credentials-very-bad-practice-and-totally-unnecessary

https://bugzilla.redhat.com/show_bug.cgi?id=659294

The patch shown in
http://core.trac.wordpress.org/changeset/16625

prompted me to try a

$ grep -r "\=\ \%s\"" *

in the web root of a WordPress installation. The matches are a bunch of
possible SQL injections. Haven't checked the actual code paths, but note
how all these strings are unescaped and potentially allow the addition
of extra statements using ';'.

Regards,
Leonard.

-- 
mount -t life -o ro /dev/dna /genetic/research


_______________________________________________
CentOS mailing list
CentOS@xxxxxxxxxx
http://lists.centos.org/mailman/listinfo/centos


[Index of Archives]     [CentOS]     [CentOS Announce]     [CentOS Development]     [CentOS ARM Devel]     [CentOS Docs]     [CentOS Virtualization]     [Carrier Grade Linux]     [Linux Media]     [Asterisk]     [DCCP]     [Netdev]     [Xorg]     [Linux USB]
  Powered by Linux