| VID |
21442 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The WordPress program, according to its version number, has multiple vulnerabilities(1). WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress versions 1.2.1 and earlier are vulnerable to multiple cross-site scripting and SQL injection vulnerabilities as follows:
1. The SQL injection issues in the index.php, edit.php and link-categories.php scripts, may allow a remote attacker to execute arbitrary SQL statements on the SQL database.
2. The cross-site scripting issues in the wp-login.php, bookmarklet.php, edit-comments.php, templates.php, link-add.php, link-categories.php, link-manager.php, post.php and moderation.php scripts, may allow for theft of cookie-based authentication credentials or other attacks.
* Note: This check solely relied on the version number of the remote WordPress program to assess this vulnerability, so this might be a false positive.
* References: http://archives.neohapsis.com/archives/bugtraq/2004-12/0194.html
* Platforms Affected: Matthew Mullenweg, WordPress 1.2.1 and earlier Any operating system Any version |
| Recommendation |
Upgrade to the latest version of WordPress (1.2.2 or later), available from the WordPress Download Web site at http://wordpress.org/download/ |
| Related URL |
(CVE) |
| Related URL |
11984 (SecurityFocus) |
| Related URL |
18538,18541 (ISS) |
|