WordPress Update Patches Pair of Vulnerabilities
Automatic updates that patch the two flaws and fix 17 bugs are now rolling out to users of the open-source WordPress CMS.A new update to the WordPress open-source blogging and content management system (CMS) has been released that patches a pair of security vulnerabilities and includes 17 bug fixes that improve functionality. One of the patched security vulnerabilities in Version 4.4.2 of WordPress was identified as a possible Server-Side Request Forgery (SSRF) vulnerability that can impact local addresses. The actual WordPress code commit that fixes the SSRF issue simply states that "0.1.2.3 is not a valid IP." WordPress has patched SSRF vulnerabilities in the past, including one with the WordPress 3.5.2 release in June 2013. An SSRF is an interesting class of vulnerability in that it can help an attacker mask his or her actions. The Mitre Common Weakness Enumeration (CWE) classification for SSRF identifies that attack class as CWE-918. "By providing URLs to unexpected hosts or ports, attackers can make it appear that the server is sending the request, possibly bypassing access controls such as firewalls that prevent the attackers from accessing the URLs directly," the Mitre CWE SSRF definition states.
The other vulnerability patched in the new WordPress release is identified as an open redirection attack. An open redirection attack is one that abuses Web functionality for linking to external sites.