Project

General

Profile

Actions

tickets #160970

closed

Vulnerable WordPress version of lizards.opensuse.org

Added by cybersecurity@suse.com 2 months ago. Updated 13 days ago.

Status:
Resolved
Priority:
Normal
Assignee:
Category:
-
Target version:
-
Start date:
2024-05-27
Due date:
% Done:

0%

Estimated time:

Description

Dear Heroes Team,

We have found, The lizards.opensuse.org is being flagged as high risk by
multiple third party security assessment vendor such as bitsight, for
patching cadence.
The reports from these vendor’s are being used by our customer to assess /
judge our security posture, which sometimes is becoming road blocker in new
/ renewal sales deal. Hence it recommended to remediate this issue.

Problem Statment:
lizards.opensuse.org is running vulnerable version (Wordpress 4.7.5) of
Wordpress.

Description:
Before version 4.8.2, WordPress mishandled % characters and additional
placeholder values in $wpdb->prepare, and thus did not properly address the
possibility of plugins and themes enabling SQL injection attacks. This
allows a code injection attack into the database engine that supports
Wordpress.

Remediation / Recommendation:

  1. Upgrade the Wordpress to version > 4.8.2 to eliminate this vulnerability.
  2. If the website is not being maintained / deprecated, it is recommended to consider it for decommission as soon as possible.
  3. Or can we have HTTP redirect (301, moved permanently) on a webserver configured to hold valid certificates for lizard.opensuse.org.
  4. Or we can use redirection record for lizard.opensuse.org to planet.opensuse.org which is first configured to hold valid certificates for lizard.opensuse.org.

Best Regards,
Shiwang on behalf of SUSE Cybersecurity Team


Related issues 1 (0 open1 closed)

Related to openSUSE admin - tickets #64550: Lizards deprecationClosedhellcp2020-03-18

Actions
Actions

Also available in: Atom PDF