VID |
210105 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The WordPress program is vulnerable to a local file include vulnerability via the 'cat' parameter. WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress version 2.3.3 and earlier versions are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the 'cat' parameter of the 'index.php' script. Regardless of PHP's 'register_globals' setting, a remote attacker could exploit this vulnerability to view arbitrary files or to execute arbitrary PHP code on the affected system.
* References: http://trac.wordpress.org/changeset/7586 http://secunia.com/advisories/29949/
* Platforms Affected: Matthew Mullenweg, WordPress version 2.3.3 and earlier versions Any operating system Any version |
Recommendation |
Upgrade to the latest version of WordPress (2.5.1 or later), available from the WordPress Download Web site at http://wordpress.org/download/
-- OR --
Apply patches based on the WordPress Trac Changeset 7586, available from the WordPress Trac Web site at http://trac.wordpress.org/changeset/7586 |
Related URL |
CVE-2008-4769 (CVE) |
Related URL |
28845 (SecurityFocus) |
Related URL |
41920 (ISS) |
|