9 beveilingsproblemen opgelost in WordPress 4.8.2

WordPress 4.8.2 is nu beschikbaar en gebruikers worden aangemoedigd om zo snel mogelijk deze versie te installeren. In deze release werden 9 beveiligingslekken opgelost. Naast deze beveiligingsproblemen zijn er ook 6 onderhoud gerelateerde correcties uitgevoerd.

Automatische updates worden uitgevoerd voor sites die dit ondersteunen. Maar als u handmatig wilt updaten kan dit door naar Dashboard > Updates te bladeren en te klikken op de knop “Nu bijwerken”.

Veiligheid voor alles

Onderstaande beveiligingsproblemen zijn opgelost (technische uitleg in het Engels):

  1. $wpdb->prepare() can create unexpected and unsafe queries leading to potential SQL injection (SQLi). WordPress core is not directly vulnerable to this issue, but we’ve added hardening to prevent plugins and themes from accidentally causing a vulnerability. Reported by Slavco
  2. A cross-site scripting (XSS) vulnerability was discovered in the oEmbed discovery. Reported by xknown of the WordPress Security Team.
  3. A cross-site scripting (XSS) vulnerability was discovered in the visual editor. Reported by Rodolfo Assis (@brutelogic) of Sucuri Security.
  4. A path traversal vulnerability was discovered in the file unzipping code. Reported by Alex Chapman (noxrnet).
  5. A cross-site scripting (XSS) vulnerability was discovered in the plugin editor. Reported by 陈瑞琦 (Chen Ruiqi).
  6. An open redirect was discovered on the user and term edit screens. Reported by Yasin Soliman (ysx).
  7. A path traversal vulnerability was discovered in the customizer. Reported by Weston Ruter of the WordPress Security Team.
  8. A cross-site scripting (XSS) vulnerability was discovered in template names. Reported by Luka (sikic).
  9. A cross-site scripting (XSS) vulnerability was discovered in the link modal. Reported by Anas Roubi (qasuar).
Door |21 september 2017|Algemeen|
Wij maken gebruik van cookies. Door verder te surfen ga je akkoord met het gebruik van deze cookies. Lees meer Akkoord