Korean
<< Back
VID 21441
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The WordPress program is vulnerable to a Cross-Site Scripting flaw in the wp-login.php script.
WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress versions 1.2.1 and earlier are vulnerable to multiple cross-site scripting flaws in the wp-login.php, bookmarklet.php, catagories.php, edit.php and edit-comments.php scripts. These cross-site scripting issues could permit a remote attacker to create a malicious link to the vulnerable application that includes hostile HTML and script code. If this link were followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.

* References:
http://archives.neohapsis.com/archives/bugtraq/2004-09/0382.html

* Platforms Affected:
Matthew Mullenweg, WordPress 1.2.1 and earlier
Microsoft Windows Any version
Linux Any version
Unix Any version
Recommendation Upgrade to the latest version of WordPress (1.2.2 or later), available from the WordPress Web site at http://wordpress.org/download/

For Gentoo Linux:
Upgrade to the latest version of WordPress (1.2.2 or later), as listed in Gentoo Linux Security Advisory GLSA 200410-12 at http://www.gentoo.org/security/en/glsa/glsa-200410-12.xml
Related URL CVE-2004-1559 (CVE)
Related URL 11268 (SecurityFocus)
Related URL 17532 (ISS)