Wednesday, June 19, 2024

WordPress 4.7.3 released with patch for six security issues, but not for CSRF

Most expected WordPress 4.7.3 is now available for update. This security update covers six security issues that exists with WordPress version 4.7.2.

Security issues:

  1. Cross-site scripting (XSS) via media file metadata. Reported by Chris Andrè Dale, Yorick Koster, and Simon P. Briggs.
  2. Control characters can trick redirect URL validation. Reported by Daniel Chatfield.
  3. Unintended files can be deleted by administrators using the plugin deletion functionality. Reported by xuliang.
  4. Cross-site scripting (XSS) via video URL in YouTube embeds. Reported by Marc Montpas.
  5. Cross-site scripting (XSS) via taxonomy term names. Reported by Delta.
  6. Cross-site request forgery (CSRF) in Press This leading to excessive use server resources. Reported by Sipke Mellema.

As indicated by Koster, who recognized the vulnerabilities in the playlist functionality, the attacker needs to persuade a editor or administrator into transferring a MP3 file containing exceptionally made metadata.

Utilizing this trap the attacker’s code will be executed when the metadata is prepared by the renderTracks() or wp_playlist_shortcode() capacities.

In any case, there is a CSRF vulnerability in WordPress that still has not been fixed, the flaw was found in July 2016 and the details for the exploitation were not disclosed.

How to update

WordPress 4.7.3 contains 39 maintenance fixes to the 4.7 release series. Updates are simple Dashboard >> Updates >> Update Now.

Sites that bolster automatic background updates are now refreshing to WordPress 4.7.3.

It is always a good idea to backup your WordPress before proceeding with update, if there is any issues,you can restore your website.

WordPress-4.7.3  MD5 : 79c278099df49ad089e659c89533d9c0

Wordpress-4.7.3  SHA-1 : 26d362ed9a41522b1e32f1c6b87ae2f16737cdd6

Also Read:

Website

Latest articles

Amtrak Data Breach: Hackers Accessed User’s Email Address

Amtrak notified its customers regarding a significant security breach involving its Amtrak Guest Rewards...

Chrome Security Update – Patch for 6 Vulnerabilities

Google has announced a new update for the Chrome browser, rolling out version 126.0.6478.114/115...

Hackers Weaponize Windows Installer (MSI) Files to Deliver Malware

Cybersecurity researchers have uncovered a sophisticated malware campaign orchestrated by a threat actor group,...

Hackers Using VPNs To Exploit Restrictions & Steal Mobile Data

Hackers are offering "free" mobile data access on Telegram channels by exploiting loopholes in...

New PhaaS Platform Lets Attackers Bypass Two-Factor Authentication

Several phishing campaign kits have been used widely by threat actors in the past....

Stuxnet, The Malware That Propagates To Air-Gapped Networks

Stuxnet, a complex worm discovered in 2010, targeted Supervisory Control and Data Acquisition (SCADA)...

Threat Actors Claiming Breach of AMD Source Code on Hacking Forums

A threat actor named " IntelBroker " claims to have breached AMD in June...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

API Vulnerability Scanning

71% of the internet traffic comes from APIs so APIs have become soft targets for hackers.Securing APIs is a simple workflow provided you find API specific vulnerabilities and protect them.In the upcoming webinar, join Vivek Gopalan, VP of Products at Indusface as he takes you through the fundamentals of API vulnerability scanning..
Key takeaways include:

  • Scan API endpoints for OWASP API Top 10 vulnerabilities
  • Perform API penetration testing for business logic vulnerabilities
  • Prioritize the most critical vulnerabilities with AcuRisQ
  • Workflow automation for this entire process

Related Articles