Korean
<< Back
VID 22733
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description A version of WordPress software which is older than version 4.5.3 is detected as installed on the host. WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress versions prior to 4.5.3 are vulnerable to multiple vulnerabilities.

- An unspecified flaw exists in the Customizer component that allows an unauthenticated, remote attacker to perform a redirect bypass. (VulnDB 140310)

- Multiple cross-site scripting vulnerabilities exist due to improper validation of user-supplied input when handling attachment names. An unauthenticated, remote attacker can exploit these issues, via a specially crafted request, to execute arbitrary script code in a user's browser session. (VulnDB 140311)

- An information disclosure vulnerability exists that allows an unauthenticated, remote attacker to disclose revision history. (VulnDB 140312)

- An unspecified flaw exists in oEmbed that allows an unauthenticated, remote attacker to cause a denial of service condition. (VulnDB 140313)

- An unspecified flaw exists that allows an unauthenticated, remote attacker to remove categories from posts. (VulnDB 140314)

- An unspecified flaw exists that is triggered when handling stolen cookies. An unauthenticated, remote attacker can exploit this to change user passwords. (VulnDB 140315)

- Multiple unspecified flaws exist in the sanitize_file_name() function that allow an unauthenticated, remote attacker to have an unspecified impact. (VulnDB 140316)

* Note: This check solely relied on the version number of the WordPress software installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
https://wordpress.org/news/2016/06/wordpress-4-5-3/

* Platforms affected:
WordPress versions prior to 4.5.3
Any operating system Any version
Recommendation Upgrade to the latest version of WordPress (4.5.3 or later), available from the WordPress Download Web site at http://wordpress.org/download/
Related URL (CVE)
Related URL (SecurityFocus)
Related URL (ISS)