Also, searching HackerOne does not reveal a public WordPress program, only
WP-API. Does this mean that WordPress was privately participating in
HackerOne for select hackers? If so, revealing that publicly is kind of
rude. 🙁
On Mon, Apr 27, 2015 at 8:55 AM, Anthony Ferrara <ircmaxell () gmail com>
wrote:
Apparently WordPress completely ignored all of their notification attempts.
Klikki just added this paragraph to the online version of their advisory ( http://klikki.fi/adv/wordpress2.html):
“WordPress has refused all communication attempts about our ongoing
security vulnerability cases since November 2014. We have tried to reach
them by email, via the…
/* really? can other people confirm this behavior pls?
*
* if the guess is off for you, by how many, and can you please
* indicate what compiler version and flags you used?
*
* ive tried with gcc 4.9.2 and 4.8.3 only on kernel 4.0.0 and glibc 2.20
* i suspect its going to be an issue with the loader and kernel and
sys_mmap.
*
* gcc -m64 -s -fpic -pie -o mmap mmap.c
*/
*Overview*
Current versions of WordPress are vulnerable to a stored XSS. An
unauthenticated attacker can inject JavaScript in WordPress comments. The
script is triggered when the comment is viewed.
If triggered by a logged-in administrator, under default settings the
attacker can leverage the vulnerability to execute arbitrary code on the
server via the plugin and theme editors.
Alternatively the attacker could change the administrator’s…