Korean
<< Back
VID 21596
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description A version of WordPress which is older than version 1.5.1 is detected as installed on the host.
WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress versions prior to 1.5.1 are vulnerable to multiple input validation vulnerabilities, which can be exploited by remote attackers to conduct cross-site scripting and SQL injection attacks.

1) An SQL Injection Vulnerability: Input passed to the "tb_id" parameter in "wp-trackback.php" script isn't properly sanitized before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
2) Multiple Cross-Site Scripting Vulnerabilities: Input passed to the "s" parameter in "wp-admin/edit.php" script and the "p" parameter in "wp-admin/post.php" script isn't properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of a vulnerable site.

It is also possible to disclose the full path to certain scripts by accessing them directly.

* Note: This check solely relied on the version number of the WordPress software installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://wordpress.org/development/2005/05/one-five-one/
http://secunia.com/advisories/15324/
http://archives.neohapsis.com/archives/bugtraq/2005-05/0251.html

* Platforms affected:
Matthew Mullenweg, WordPress versions prior to 1.5.1
Any operating system Any version
Recommendation Upgrade to the latest version of WordPress (1.5.1 or later), available from the WordPress Download Web page at http://wordpress.org/download/
Related URL CVE-2005-1687,CVE-2005-1688 (CVE)
Related URL 13663,13664,13655 (SecurityFocus)
Related URL 20675,20677,20680 (ISS)