| VID |
21374 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The WordPress program has an SQL Injection Vulnerability. WordPress is a personal publishing system that focuses on Web standards. WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress versions 0.7 is vulnerable to a SQL Injection vulnerability, caused by improper filtering of user input that is passed to the 'posts' variable. By sending a specially crafted request including SQL code, a remote attacker could the SQL code to be executed by the underlying database server.
* References: http://securitytracker.com/alerts/2003/Jun/1006937.html http://www.osvdb.org/displayvuln.php?osvdb_id=4610
* Platforms Affected: Matthew Mullenweg, WordPress 0.7 Microsoft Windows Any version Unix Any version Linux Any version |
| Recommendation |
Upgrade to the version (0.72 RC1 or later) fixed this vulnerability, available from the WordPress Download Web page at http://wordpress.org/download/ |
| Related URL |
(CVE) |
| Related URL |
7784 (SecurityFocus) |
| Related URL |
12204 (ISS) |
|