Ãë¾àÁ¡ID |
21372 |
À§Çèµµ |
30 |
Æ÷Æ® |
80, ... |
ÇÁ·ÎÅäÄÝ |
TCP |
ºÐ·ù |
CGI |
»ó¼¼¼³¸í |
ÇØ´ç WordPress ÇÁ·Î±×·¥ ¹öÀü¿¡ µû¸£¸é, WordPress ½Ã½ºÅÛ¿¡´Â HTTP response splitting Ãë¾àÁ¡ÀÌ Á¸ÀçÇÑ´Ù. WordPress ´Â MySQL µ¥ÀÌÅͺ£À̽º¸¦ »ç¿ëÇÏ´Â PHP ±â¹ÝÀÇ ÃâÆÇ(publication) ÇÁ·Î±×·¥À¸·Î¼, ¹«·á·Î »ç¿ë °¡´ÉÇÑ ÇÁ·Î±×·¥ÀÌ´Ù. WordPress ¹öÀü 1.2¿Í ±× ÀÌÀü ¹öÀüµéÀº 'wp-login.php' ½ºÅ©¸³Æ® »ó¿¡¼ »ç¿ëÀÚ ÀԷ¿¡ ´ëÇÑ ¿Ã¹Ù¸¥ °Ë»ç°¡ ¼öÇàµÇÁö ¸øÇÏ¿© HTTP response splitting °ø°Ý¿¡ ¿µÇâÀ» ¹ÞÀ» ¼ö ÀÖ´Ù. °ø°ÝÀÚµéÀº Àß Á¶ÀÛµÈ POST ¿äûÀ» ¼¹ö¿¡ Àü´ÞÇÏ´Â ¹æ¹ýÀ¸·Î, ´ë»ó ¼¹ö°¡ ºÐ¸®µÈ ÀÀ´ä(response)À» ¹ÝȯÇϵµ·Ï ¸¸µé ¼ö ÀÖ´Ù. ÀÌ´Â °ø°ÝÀÚµéÀÌ Web cache poisoning °ø°Ý, Cross-Site Scripting °ø°Ý, Áß¿äÇÑ Á¤º¸ ȹµæ µî°ú °°ÀÌ º¸´Ù Áö´ÉÈµÈ °ø°ÝÀ» ¼öÇàÇÏ´Â µ¥ µµ¿òÀ» ÁØ´Ù.
* ¾Ë¸²: ÀÌ Á¡°ËÇ׸ñÀº ÀÌ Ãë¾àÁ¡À» Á¡°ËÇϱâ À§ÇØ ÇØ´ç WordPress ÇÁ·Î±×·¥ ¹öÀü Á¤º¸¸¸À» È®ÀÎÇÑ´Ù. µû¶ó¼ °ÅÁþ ¾ç¼º¹ÝÀÀ(False Positive)À» º¸ÀÏ ¼ö ÀÖ´Ù.
* Âü°í »çÀÌÆ®: http://securitytracker.com/alerts/2004/Oct/1011592.html http://archives.neohapsis.com/archives/bugtraq/2004-10/0063.html
* ¿µÇâÀ» ¹Þ´Â Ç÷§Æû: Matthew Mullenweg, WordPress 1.2 ¿Í ±× ÀÌÀü ¹öÀüµé Microsoft Windows Any version Unix Any version Linux Any version |
ÇØ°áÃ¥ |
´ÙÀ½ WordPress ´Ù¿î·Îµå À¥ ÆäÀÌÁö http://wordpress.org/download/ ¿¡¼ ±¸ÇÒ ¼ö ÀÖ´Â °¡Àå ÃÖ½ÅÀÇ WordPress ¹öÀü(1.2.1 ¶Ç´Â ±× ÀÌÈÄ)À¸·Î ¾÷±×·¹À̵å ÇÏ¿©¾ß ÇÑ´Ù. |
°ü·Ã URL |
CVE-2004-1584 (CVE) |
°ü·Ã URL |
11348 (SecurityFocus) |
°ü·Ã URL |
17649 (ISS) |
|