| VID |
21441 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The WordPress program is vulnerable to a Cross-Site Scripting flaw in the wp-login.php script. WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress versions 1.2.1 and earlier are vulnerable to multiple cross-site scripting flaws in the wp-login.php, bookmarklet.php, catagories.php, edit.php and edit-comments.php scripts. These cross-site scripting issues could permit a remote attacker to create a malicious link to the vulnerable application that includes hostile HTML and script code. If this link were followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* References: http://archives.neohapsis.com/archives/bugtraq/2004-09/0382.html
* Platforms Affected: Matthew Mullenweg, WordPress 1.2.1 and earlier Microsoft Windows Any version Linux Any version Unix Any version |
| Recommendation |
Upgrade to the latest version of WordPress (1.2.2 or later), available from the WordPress Web site at http://wordpress.org/download/
For Gentoo Linux: Upgrade to the latest version of WordPress (1.2.2 or later), as listed in Gentoo Linux Security Advisory GLSA 200410-12 at http://www.gentoo.org/security/en/glsa/glsa-200410-12.xml |
| Related URL |
CVE-2004-1559 (CVE) |
| Related URL |
11268 (SecurityFocus) |
| Related URL |
17532 (ISS) |
|