Korean
<< Back
VID 21373
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The WordPress program has a Remote Code Execution Vulnerability.
WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress versions 0.7 allows a remote attacker to include a malicious remote PHP file, caused by insufficient sanitization of user-supplied URI parameters. By sending a specially crafted request with the "abspath" variable to the 'links.all.php' module, a remote attacker could include a malicious remote PHP file, which could execute arbitrary code.

* References:
http://securitytracker.com/alerts/2003/Jun/1006937.html
http://www.osvdb.org/displayvuln.php?osvdb_id=4610

* Platforms Affected:
Matthew Mullenweg, WordPress 0.7
Microsoft Windows Any version
Unix Any version
Linux Any version
Recommendation Upgrade to the version (0.72 RC1 or later) fixed this vulnerability, available from the WordPress Download Web page at http://wordpress.org/download/
Related URL (CVE)
Related URL 7785 (SecurityFocus)
Related URL 12204 (ISS)