FreeBSD : wordpress -- header rss feed script insertion vulnerability (622bc638-be27-11dd-a578-0030843d3802)

This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.


Synopsis :

The remote FreeBSD host is missing one or more security-related
updates.

Description :

Secunia reports :

Input passed via the HTTP 'Host' header is not properly sanitised
before being used. This can be exploited to execute arbitrary HTML and
script code in a user's browser session in context of an affected site
if malicious data is viewed.

See also :

http://wordpress.org/development/2008/11/wordpress-265/
http://www.nessus.org/u?bbe5dff4

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)

Family: FreeBSD Local Security Checks

Nessus Plugin ID: 34978 (freebsd_pkg_622bc638be2711dda5780030843d3802.nasl)

Bugtraq ID:

CVE ID: CVE-2008-5278

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now