Korean
<< Back
VID 21372
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The WordPress program, according to its version number, has an HTTP response splitting Vulnerability.
WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress version 1.2 and prior are vulnerable to an HTTP response splitting attack, caused by proper validating of user-supplied input in the 'wp-login.php' script. By sending a specially crafted POST request, a remote attacker could cause the target server to return a split response. It would allow the attacker to perform further attacks, such as Web cache poisoning, cross-site scripting, and possibly obtain sensitive information.

* Note: This check solely relied on the version number of the remote WordPress program to program this vulnerability, so this might be a false positive.

* References:
http://securitytracker.com/alerts/2004/Oct/1011592.html

* Platforms Affected:
Matthew Mullenweg, WordPress 1.2 and prior
Microsoft Windows Any version
Unix Any version
Linux Any version
Recommendation Upgrade to the latest version of WordPress (1.2.1 or later), available from the WordPress Download Web page at http://wordpress.org/download/
Related URL CVE-2004-1584 (CVE)
Related URL 11348 (SecurityFocus)
Related URL 17649 (ISS)