| VID |
21596 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
A version of WordPress which is older than version 1.5.1 is detected as installed on the host. WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress versions prior to 1.5.1 are vulnerable to multiple input validation vulnerabilities, which can be exploited by remote attackers to conduct cross-site scripting and SQL injection attacks.
1) An SQL Injection Vulnerability: Input passed to the "tb_id" parameter in "wp-trackback.php" script isn't properly sanitized before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. 2) Multiple Cross-Site Scripting Vulnerabilities: Input passed to the "s" parameter in "wp-admin/edit.php" script and the "p" parameter in "wp-admin/post.php" script isn't properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of a vulnerable site.
It is also possible to disclose the full path to certain scripts by accessing them directly.
* Note: This check solely relied on the version number of the WordPress software installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://wordpress.org/development/2005/05/one-five-one/ http://secunia.com/advisories/15324/ http://archives.neohapsis.com/archives/bugtraq/2005-05/0251.html
* Platforms affected: Matthew Mullenweg, WordPress versions prior to 1.5.1 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of WordPress (1.5.1 or later), available from the WordPress Download Web page at http://wordpress.org/download/ |
| Related URL |
CVE-2005-1687,CVE-2005-1688 (CVE) |
| Related URL |
13663,13664,13655 (SecurityFocus) |
| Related URL |
20675,20677,20680 (ISS) |
|