WordPress < 3.0.2 Multiple Vulnerabilities

Medium Nessus Plugin ID 51860

Synopsis

The remote web server hosts a PHP application that is affected by multiple vulnerabilities.

Description

According to its version number, the installation of WordPress hosted on the remote web server is affected by multiple vulnerabilities :

- A SQL injection vulnerability exists in the 'wp-includes/comment.php' script due to improper sanitization of user-supplied input to the 'Send Trackbacks' field. A remote attacker can exploit this to inject or manipulate SQL queries to manipulate or disclose arbitrary data. (CVE-2010-4257)

- A cross-site scripting vulnerability exists in the request_filesystem_credentials() function in the 'wp-admin/includes/file.php' script where input passed from an error message for an FTP or SSH connection attempt is not validated. This allows a context-dependent attacker to use a specially crafted request to execute arbitrary script code within the user's browser session. (CVE-2010-5294)

- A cross-site scripting vulnerability exists in the 'wp-admin/plugins.php' script due to improper validation of input supplied via a plugin's 'author' field. This allows a remote attacker to inject arbitrary script or HTML code in a user's browser session. (CVE-2010-5295)

- A security bypass vulnerability exists in the 'wp-includes/capabilities.php' script. When a multisite configuration is used, Super Admin privileges are not needed for the 'delete_users' capability. This allows an authenticated attacker to bypass access restrictions.
(CVE-2010-5296)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to WordPress 3.0.2 or later.

See Also

http://wordpress.org/news/2010/11/wordpress-3-0-2

https://core.trac.wordpress.org/changeset/16373

https://codex.wordpress.org/Version_3.0.2

Plugin Details

Severity: Medium

ID: 51860

File Name: wordpress_3_0_2.nasl

Version: 1.17

Type: remote

Family: CGI abuses

Published: 2011/02/03

Modified: 2018/08/07

Dependencies: 18297

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 6

Temporal Score: 4.4

Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Required KB Items: installed_sw/WordPress, www/PHP, Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No exploit is required

Patch Publication Date: 2010/11/30

Vulnerability Publication Date: 2010/09/04

Reference Information

CVE: CVE-2010-4257, CVE-2010-5294, CVE-2010-5295, CVE-2010-5296, CVE-2010-5293

BID: 45131, 65233, 65240, 73661, 65235

Secunia: 42431

CWE: 20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990