Korean
<< Back
VID 21613
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The WordPress, according to its version number, has an SQL injection vulnerability in the cat_ID parameter. WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress versions 1.5.1.1 and earlier could allow a remote attacker to execute arbitrary SQL commands, caused by improper filtering of user-supplied input passed to the 'cat_ID' parameter of the 'template-functions-category.php' script. This vulnerability could permit a remote attacker to pass malicious input to database queries, potentially resulting in data exposure, modification of the query logic, or even data modification or attacks against the database itself.

* Note: This check solely relied on the version number of the WordPress software installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://secunia.com/advisories/15517/

* Platforms affected:
Matthew Mullenweg, WordPress versions 1.5.1.1 and earlier
Any operating system Any version
Recommendation Upgrade to the latest version of WordPress (1.5.1.2 or later), available from the WordPress Download Web page at http://wordpress.org/download/
Related URL CVE-2005-1810 (CVE)
Related URL 13809 (SecurityFocus)
Related URL 20848 (ISS)