VID |
22773 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
A version of WordPress software which is older than version 4.7.2 is detected as installed on the host. WordPress is a freely available PHP-based publication program that uses a MySQL backend database. WordPress versions prior to 4.7.2 are vulnerable to multiple vulnerabilities.
- An information disclosure vulnerability exists in the class-wp-press-this.php script due to a failure to properly restrict the user interface for assigning taxonomy terms. An authenticated, remote attacker can exploit this to disclose sensitive information. (CVE-2017-5610)
- A SQL injection (SQLi) vulnerability exists in the class-wp-query.php script due to a failure to sanitize input to post type names. An unauthenticated, remote attacker can exploit this to inject or manipulate SQL queries in the back-end database, resulting in the disclosure or manipulation of arbitrary data. (CVE-2017-5611)
- A cross-site scripting (XSS) vulnerability exists in the class-wp-posts-list-table.php script due to improper validation of input to the posts list table. An unauthenticated, remote attacker can exploit this, via a specially crafted request, to execute arbitrary script code in a user's browser session. (CVE-2017-5612)
* Note: This check solely relied on the version number of the WordPress software installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: https://wordpress.org/news/2017/01/wordpress-4-7-2-security-release/ https://codex.wordpress.org/Version_4.7.2
* Platforms affected: WordPress versions prior to 4.7.2 Any operating system Any version |
Recommendation |
Upgrade to the latest version of WordPress (4.7.2 or later), available from the WordPress Download Web site at http://wordpress.org/download/ |
Related URL |
CVE-2017-5610,CVE-2017-5611,CVE-2017-5612 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|