| VID |
210105 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The WordPress program is vulnerable to a local file include vulnerability via the 'cat' parameter. WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress version 2.3.3 and earlier versions are vulnerable to a local file include vulnerability, caused by improper validation of user-supplied input passed to the 'cat' parameter of the 'index.php' script. Regardless of PHP's 'register_globals' setting, a remote attacker could exploit this vulnerability to view arbitrary files or to execute arbitrary PHP code on the affected system.
* References: http://trac.wordpress.org/changeset/7586 http://secunia.com/advisories/29949/
* Platforms Affected: Matthew Mullenweg, WordPress version 2.3.3 and earlier versions Any operating system Any version |
| Recommendation |
Upgrade to the latest version of WordPress (2.5.1 or later), available from the WordPress Download Web site at http://wordpress.org/download/
-- OR --
Apply patches based on the WordPress Trac Changeset 7586, available from the WordPress Trac Web site at http://trac.wordpress.org/changeset/7586 |
| Related URL |
CVE-2008-4769 (CVE) |
| Related URL |
28845 (SecurityFocus) |
| Related URL |
41920 (ISS) |
|