Korean
<< Back
VID 210096
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The WordPress program is vulnerable to an SQL injection vulnerability via the fim_rss.php script in the fGallery plugin. WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress fGallery plugin for WordPress version 2.4.1 and other versions could allow a remote attacker to execute arbitrary SQL commands, caused by improper filtering of user-supplied input passed to the 'album' parameter of the 'fim_rss.php' script. Regardless of PHP's 'magic_quotes_gpc' setting, a remote attacker could exploit this vulnerability to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.

* References:
http://www.frsirt.com/english/advisories/2008/0349
http://www.milw0rm.com/exploits/4845

* Platforms Affected:
WordPress, fGallery plugin for WordPress version 2.4.1 and other versions
Any operating system Any version
Recommendation No upgrade or patch available as of June 2014.

As a workaround, edit the source code to ensure that input is properly sanitized.
Related URL CVE-2008-0491 (CVE)
Related URL 27464 (SecurityFocus)
Related URL 39964 (ISS)