wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/ | release notes vendor advisory |
https://github.com/WordPress/wordpress-develop/commit/b1975463dd995da19bb40d3fa0786498717e3c53 | patch |
https://seclists.org/bugtraq/2020/Jan/8 | third party advisory mailing list |
https://www.debian.org/security/2020/dsa-4599 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/01/msg00010.html | third party advisory mailing list |
https://www.debian.org/security/2020/dsa-4677 | third party advisory vendor advisory |