VID |
210131 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
A version of WordPress software which is older than or as old as version 3.3.1 is detected as installed on the host. WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress versions 3.3.1 and earlier are vulnerable to multiple vulnerabilities.
- Limited privilege escalation where a site administrator could deactivate network-wide plugins when running a WordPress network under particular circumstances. - Cross-site scripting vulnerability when making URLs clickable. - Cross-site scripting vulnerabilities in redirects after posting comments in older browsers, and when filtering URLs.
* Note: This check solely relied on the version number of the WordPress software installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: https://codex.wordpress.org/Version_3.3.2 http://www.freebsd.org/ports/portaudit/b384cc5b-8d56-11e1-8d7b-003067b2972c.html
* Platforms affected: WordPress versions 3.3.1 and earlier Any operating system Any version |
Recommendation |
Upgrade to the latest version of WordPress (3.3.2 or later), available from the WordPress Download Web site at http://wordpress.org/download/ |
Related URL |
CVE-2012-2399,CVE-2012-2400,CVE-2012-2401,CVE-2012-2402,CVE-2012-2403,CVE-2012-2404 (CVE) |
Related URL |
53192 (SecurityFocus) |
Related URL |
(ISS) |
|