| VID |
21613 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The WordPress, according to its version number, has an SQL injection vulnerability in the cat_ID parameter. WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress versions 1.5.1.1 and earlier could allow a remote attacker to execute arbitrary SQL commands, caused by improper filtering of user-supplied input passed to the 'cat_ID' parameter of the 'template-functions-category.php' script. This vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.
* Note: This check solely relied on the version number of the WordPress software installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://secunia.com/advisories/15517/
* Platforms affected: Matthew Mullenweg, WordPress versions 1.5.1.1 and earlier Any operating system Any version |
| Recommendation |
Upgrade to the latest version of WordPress (1.5.1.2 or later), available from the WordPress Download Web page at http://wordpress.org/download/ |
| Related URL |
CVE-2005-1810 (CVE) |
| Related URL |
13809 (SecurityFocus) |
| Related URL |
20848 (ISS) |
|