WordPress <= 2.3.3 'index.php' Arbitrary File Access

medium Nessus Network Monitor Plugin ID 4482

Synopsis

The remote host is vulnerable to a flaw that allows attackers to retrieve sensitive files or data.

Description

The version of WordPress installed on the remote host is vulnerable to a directory traversal attack. An attacker exploiting this flaw would send malformed data to the 'cat' parameter of the 'index.php' script. Successful exploitation would result in the attacker gaining access to confidential files on the target server.

Solution

Upgrade to WordPress 2.5, or higher.

See Also

http://wordpress.org

Plugin Details

Severity: Medium

ID: 4482

Family: CGI

Published: 4/21/2008

Updated: 3/6/2019

Nessus ID: 32080

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Reference Information

CVE: CVE-2008-4769

BID: 28845