CVE-2007-0541

medium

Description

WordPress allows remote attackers to determine the existence of arbitrary files, and possibly read portions of certain files, via pingback service calls with a source URI that corresponds to a local pathname, which triggers different fault codes for existing and non-existing files, and in certain configurations causes a brief file excerpt to be published as a blog comment.

References

http://securityreason.com/securityalert/2191

http://www.securityfocus.com/archive/1/457996/100/0/threaded

http://www.securityfocus.com/archive/1/458003/100/0/threaded

Details

Source: MITRE

Published: 2007-01-29

Updated: 2018-10-16

Type: CWE-264

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM