CVE-2018-20148

Priority
Description
In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could conduct
PHP object injection attacks via crafted metadata in a wp.getMediaItem
XMLRPC call. This is caused by mishandling of serialized data at phar://
URLs in the wp_get_attachment_thumb_file function in wp-includes/post.php.
Notes
Package
Upstream:released (5.0.1+dfsg1-1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needs-triage)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):needed
Ubuntu 19.10 (Eoan Ermine):not-affected (5.0.1+dfsg1-1)
Ubuntu 20.04 (Focal Fossa):not-affected (5.0.1+dfsg1-1)
More Information

Updated: 2020-01-29 18:53:53 UTC (commit 40f18bf14da5fb50662e1f861ea594a462b207fe)