VID |
210138 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
A version of WordPress software which is older than or as old as version 3.5.0 is detected as installed on the host. WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress versions 3.5.0 and earlier are vulnerable to multiple vulnerabilities.
- The application is affected by a server-side request forgery vulnerability in the pingback.ping method used in xmlrpc.php. This vulnerability can be used to expose information and remotely port scan a host using pingbacks. (CVE-2013-0235) - The application is affected by two instances of cross-site scripting (XSS) attacks via shortcodes and post content. (CVE-2013-0236) - The application is affected by a cross-site scripting (XSS) vulnerability in the Plupload external library. (CVE-2013-0237)
* Note: This check solely relied on the version number of the WordPress software installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: https://github.com/FireFart/WordpressPingbackPortScanner http://www.securityfocus.com/archive/1/525045/30/0/threaded http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html http://wordpress.org/news/2013/01/wordpress-3-5-1/ http://codex.wordpress.org/Version_3.5.1
* Platforms affected: WordPress versions 3.5.0 and earlier Any operating system Any version |
Recommendation |
Upgrade to the latest version of WordPress (3.5.1 or later), available from the WordPress Download Web site at http://wordpress.org/download/ |
Related URL |
CVE-2013-0235,CVE-2013-0236,CVE-2013-0237 (CVE) |
Related URL |
57554,57555 (SecurityFocus) |
Related URL |
(ISS) |
|