Name | CVE-2015-8834 |
Description | Cross-site scripting (XSS) vulnerability in wp-includes/wp-db.php in WordPress before 4.2.2 allows remote attackers to inject arbitrary web script or HTML via a long comment that is improperly stored because of limitations on the MySQL TEXT data type. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-3440. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-633-1, DSA-3639-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
wordpress (PTS) | jessie, jessie (lts) | 4.1.35+dfsg-0+deb8u1 | fixed |
| stretch (security), stretch (lts), stretch | 4.7.23+dfsg-0+deb9u1 | fixed |
| buster (security), buster, buster (lts) | 5.0.21+dfsg1-0+deb10u1 | fixed |
| bullseye (security), bullseye | 5.7.11+dfsg1-0+deb11u1 | fixed |
| bookworm (security), bookworm | 6.1.6+dfsg1-0+deb12u1 | fixed |
| sid, trixie | 6.6.1+dfsg1-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://wordpress.org/news/2015/05/wordpress-4-2-2/
Follow-up patch from 4.2.1 -> 4.2.2 for wp-includes/wp-db.php seems not applied
This looks like a required patch: https://github.com/WordPress/WordPress/commit/a3a76fe665dfb62508a66542390a93445f1f7a59
Changes in wp-includes/wp-db.php: https://github.com/WordPress/WordPress/commit/db8f915ee6c236ee2f39e76781bf42367e3f1490
https://core.trac.wordpress.org/changeset/32387/
Wheezy: https://core.trac.wordpress.org/changeset/32391
Wheezy: https://core.trac.wordpress.org/changeset/32395
Wheezy: https://core.trac.wordpress.org/changeset/32423
Wheezy: https://core.trac.wordpress.org/changeset/32435