Name | CVE-2015-3429 |
Description | Cross-site scripting (XSS) vulnerability in example.html in Genericons before 3.3.1, as used in WordPress before 4.2.2, allows remote attackers to inject arbitrary web script or HTML via a fragment identifier. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-3328-1 |
Debian Bugs | 784603 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
wordpress (PTS) | jessie, jessie (lts) | 4.1.35+dfsg-0+deb8u1 | fixed |
| stretch (security), stretch (lts), stretch | 4.7.23+dfsg-0+deb9u1 | fixed |
| buster (security), buster, buster (lts) | 5.0.21+dfsg1-0+deb10u1 | fixed |
| bullseye (security), bullseye | 5.7.11+dfsg1-0+deb11u1 | fixed |
| bookworm (security), bookworm | 6.1.6+dfsg1-0+deb12u1 | fixed |
| sid, trixie | 6.6.1+dfsg1-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
[wheezy] - wordpress <not-affected> (twentyfifteen theme not present)
[squeeze] - wordpress <not-affected> (twentyfifteen theme not present)
https://wordpress.org/news/2015/05/wordpress-4-2-2/
https://www.netsparker.com/cve-2015-3429-dom-xss-vulnerability-in-twenty-fifteen-wordpress-theme/
The default theme twentyfifteen is not present in wheezy. Upstream has
commited https://core.trac.wordpress.org/changeset/32385 though which
will enericons example.html files if present. As the file was included
in other popular themes and plugins maybe it should as well be included
in an update for wordpress for wheezy?