WordPress < 3.1.4 / 3.2-RC3 Multiple Blind SQL Injection Vulnerabilities

medium Nessus Plugin ID 56620

Synopsis

The remote web server contains a PHP application with multiple blind SQL injection vulnerabilities.

Description

The remote web server hosts a version of WordPress prior to 3.1.4 / 3.2-RC3. It is reportedly affected by multiple SQL injection vulnerabilities due to a failure to adequately sanitize user-supplied input prior to using it in database queries.

Solution

Upgrade WordPress to version 3.1.4 or 3.2-RC3.

See Also

http://www.nessus.org/u?50d3d20a

Plugin Details

Severity: Medium

ID: 56620

File Name: wordpress_3_1_4.nasl

Version: 1.10

Type: remote

Family: CGI abuses

Published: 10/24/2011

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 6

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Required KB Items: installed_sw/WordPress, www/PHP, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/29/2011

Vulnerability Publication Date: 6/21/2011

Reference Information

BID: 48521