WordPress < 1.2.2 Multiple Vulnerabilities

high Nessus Plugin ID 15988

Synopsis

The remote web server contains several PHP scripts that are prone to SQL injection and cross-site scripting attacks.

Description

According to its banner, the remote host has a version of WordPress that is is vulnerable to various flaws which may allow an attacker to perform an HTML injection attack against the remote host or allow an attacker to execute arbitrary SQL statements against the remote database.

Solution

Upgrade to WordPress 1.2.2 or greater.

See Also

https://www.securityfocus.com/archive/1/384659

https://wordpress.org/news/2004/12/one-point-two-two/

Plugin Details

Severity: High

ID: 15988

File Name: wordpress_flaws2.nasl

Version: 1.25

Type: remote

Family: CGI abuses

Published: 12/16/2004

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Required KB Items: installed_sw/WordPress, www/PHP, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: No exploit is required

Patch Publication Date: 12/15/2004

Vulnerability Publication Date: 12/15/2004

Reference Information

BID: 11984

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990