Skip to content
This repository was archived by the owner on Mar 1, 2023. It is now read-only.

Commit 08794e8

Browse files
committed
Automatically updated on Thu, 20 May 2021 04:48:30 GMT
1 parent 3351c6d commit 08794e8

File tree

3 files changed

+26
-10
lines changed

3 files changed

+26
-10
lines changed

_site/_headers

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
11
/*
2-
Last-Modified: Wed, 19 May 2021 04:47:59 GMT
2+
Last-Modified: Thu, 20 May 2021 04:48:30 GMT

security-advisories-sha

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
124da73d3a13e14334f3a775cb9c6e404df075c6209
1+
125f82a3901599b13647e0b049a0b823aa37ad96259

security-advisories.json

Lines changed: 24 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -26166,7 +26166,7 @@
2616626166
"time": 1620806400,
2616726167
"versions": [
2616826168
">=3.4.0",
26169-
"<3.4.48"
26169+
"<3.4.49"
2617026170
]
2617126171
},
2617226172
"4.0.x": {
@@ -26201,7 +26201,7 @@
2620126201
"time": 1620806400,
2620226202
"versions": [
2620326203
">=4.4.0",
26204-
"<4.4.23"
26204+
"<4.4.24"
2620526205
]
2620626206
}
2620726207
},
@@ -26583,7 +26583,7 @@
2658326583
"time": 1620806400,
2658426584
"versions": [
2658526585
">=3.4.0",
26586-
"<3.4.48"
26586+
"<3.4.49"
2658726587
]
2658826588
},
2658926589
"4.0.x": {
@@ -26618,7 +26618,7 @@
2661826618
"time": 1620806400,
2661926619
"versions": [
2662026620
">=4.4.0",
26621-
"<4.4.23"
26621+
"<4.4.24"
2662226622
]
2662326623
},
2662426624
"5.0.x": {
@@ -26639,7 +26639,7 @@
2663926639
"time": 1620806400,
2664026640
"versions": [
2664126641
">=5.2.0",
26642-
"<5.2.8"
26642+
"<5.2.9"
2664326643
]
2664426644
}
2664526645
},
@@ -30273,7 +30273,7 @@
3027330273
"time": 1620806400,
3027430274
"versions": [
3027530275
">=3.4.0",
30276-
"<3.4.48"
30276+
"<3.4.49"
3027730277
]
3027830278
},
3027930279
"4.0.x": {
@@ -30308,7 +30308,7 @@
3030830308
"time": 1620806400,
3030930309
"versions": [
3031030310
">=4.4.0",
30311-
"<4.4.23"
30311+
"<4.4.24"
3031230312
]
3031330313
},
3031430314
"5.0.x": {
@@ -30329,7 +30329,7 @@
3032930329
"time": 1620806400,
3033030330
"versions": [
3033130331
">=5.2.0",
30332-
"<5.2.8"
30332+
"<5.2.9"
3033330333
]
3033430334
}
3033530335
},
@@ -35998,6 +35998,22 @@
3599835998
"reference": "composer://willdurand/js-translation-bundle"
3599935999
}
3600036000
},
36001+
"wp-cli/wp-cli": {
36002+
"CVE-2021-29504": {
36003+
"title": "### Impact\nAn improper error handling in HTTPS requests management in WP-CLI version 0.12.0 and later allows remote attackers able to intercept the communication to remotely disable the certificate verification on WP-CLI side, gaining full control over the communication content, including the ability to impersonate update servers and push malicious updates towards WordPress instances controlled by the vulnerable WP-CLI agent, or push malicious updates toward WP-CLI itself.\n\n### Patches\nThe vulnerability stems from the fact that the default behavior of `WP_CLI\\Utils\\http_request()` when encountering a TLS handshake error is to disable certificate validation and retry the same request.\n\nThe default behavior has been changed with version 2.5.0 of WP-CLI and the `wp-cli/wp-cli` framework (via https://github.com/wp-cli/wp-cli/pull/5523) so that the `WP_CLI\\Utils\\http_request()` method accepts an `$insecure` option that is `false` by default and consequently that a TLS handshake failure is a hard error by default. This new default is a breaking change and ripples through to all consumers of `WP_CLI\\Utils\\http_request()`, including those in separate WP-CLI bundled or third-party packages.\n\nhttps://github.com/wp-cli/wp-cli/pull/5523 has also added an `--insecure` flag to the `cli update` command to counter this breaking change.\n\nSubsequent PRs on the command repositories have added an `--insecure` flag to the appropriate commands on the following repositories to counter the breaking change:\n\n* https://github.com/wp-cli/config-command/pull/128\n* https://github.com/wp-cli/core-command/pull/186\n* https://github.com/wp-cli/extension-command/pull/287\n* https://github.com/wp-cli/checksum-command/pull/86\n* https://github.com/wp-cli/package-command/pull/138\n\n### Workarounds\nThere is no direct workaround for the default insecure behavior of `wp-cli/wp-cli` versions before 2.5.0.\n\nThe workaround for dealing with the breaking change in the commands directly affected by the new secure default behavior is to add the `--insecure` flag to manually opt-in to the previous insecure behavior.\n\n### References\n* [CWE: Improper Certificate Validation](https://cwe.mitre.org/data/definitions/295.html)\n\n### For more information\nIf you have any questions or comments about this advisory:\n* Join the `#cli` channel in the [WordPress.org Slack](https://make.wordpress.org/chat/) to ask questions or provide feedback.\n",
36004+
"link": "https://github.com/advisories/GHSA-rwgm-f83r-v3qj",
36005+
"cve": "CVE-2021-29504",
36006+
"branches": {
36007+
"2.5.x": {
36008+
"time": 1621465391,
36009+
"versions": [
36010+
"< 2.5.0"
36011+
]
36012+
}
36013+
},
36014+
"reference": "composer://wp-cli/wp-cli"
36015+
}
36016+
},
3600136017
"yii2mod/yii2-cms": {
3600236018
"CVE-2019-16130": {
3600336019
"title": "YII2-CMS v1.0 has XSS in protected\\core\\modules\\home\\models\\Contact.php via a name field to /contact.html.",

0 commit comments

Comments
 (0)