VID |
210126 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
A version of WordPress software which is older or as old as than version 3.4.0 is detected as installed on the host. WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress versions 3.4.0 and earlier are vulnerable to multiple vulnerabilities,
- Version 3.4.0 does not properly restrict access to unfiltered_html when multisite is enabled, which allows for remote administrators or editors to perform cross-site scripting (XSS) attacks.(CVE-2012-3383)
- The application is affected by a cross-site request forgery (CSRF) vulnerability that could allow remote attackers to hijack the authentication of victims via unknown vectors. (CVE-2012-3384)
- The application is affected by an information disclosure vulnerability because of an error in checking user permissions when handling XMLRPC requests. Successfully exploiting this issue would allow an attacker to edit posts by users with insufficient permissions. (CVE-2012-3385)
* Note: This check solely relied on the version number of the WordPress software installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://wordpress.org/news/2012/06/wordpress-3-4-1/ http://codex.wordpress.org/Version_3.4.1
* Platforms affected: Matthew Mullenweg, WordPress versions 3.4.0 and earlier Any operating system Any version |
Recommendation |
Upgrade to the latest version of WordPress (3.4.1 or later), available from the WordPress Download Web site at http://wordpress.org/download/ |
Related URL |
CVE-2012-3383,CVE-2012-3384,CVE-2012-3385 (CVE) |
Related URL |
54224 (SecurityFocus) |
Related URL |
(ISS) |
|