Korean
<< Back
VID 210105
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The WordPress program is vulnerable to a local file include vulnerability via the 'cat' parameter. WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress version 2.3.3 and earlier versions are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the 'cat' parameter of the 'index.php' script. Regardless of PHP's 'register_globals' setting, a remote attacker could exploit this vulnerability to view arbitrary files or to execute arbitrary PHP code on the affected system.

* References:
http://trac.wordpress.org/changeset/7586
http://secunia.com/advisories/29949/

* Platforms Affected:
Matthew Mullenweg, WordPress version 2.3.3 and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version of WordPress (2.5.1 or later), available from the WordPress Download Web site at http://wordpress.org/download/

-- OR --

Apply patches based on the WordPress Trac Changeset 7586, available from the WordPress Trac Web site at http://trac.wordpress.org/changeset/7586
Related URL CVE-2008-4769 (CVE)
Related URL 28845 (SecurityFocus)
Related URL 41920 (ISS)