I/O Sanity Failures in _wp_specialchars()
|Reported by:||miqrogroove||Owned by:|
$string = str_replace( array( '|wp_entity|', '|/wp_entity|' ), array( '&', ';' ), $string );
This bug was reported to the security group during the 3.2 RC1 development cycle.
A patch was submitted to the security group prior to 3.2 RC1.
Today we agreed to add the patch to a Trac ticket.
I believe this bug affects all versions of WordPress from version 2.8 through 3.2.1.
Anonymous users can break comment feed validation by injecting the phrase |wp_entity| into the body of any comment in the feed.
Any other output from _wp_specialchars() would be similarly vulnerable, but the comment feed is the most obvious example.
Change History (4)
comment:2 SergeyBiryukov — 3 years ago
- Milestone changed from Awaiting Review to 3.3
- Resolution set to fixed
- Status changed from new to closed