Language:
https://github.com/FireFart/WordpressPingbackPortScanner
https://www.securityfocus.com/archive/1/525045/30/0/threaded
http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
Severity: Medium
ID: 64453
File Name: wordpress_xmlrpc_pingback_request_forgery.nasl
Version: 1.12
Type: remote
Family: CGI abuses
Published: 2/4/2013
Updated: 1/19/2021
Risk Factor: Medium
Score: 4.8
Risk Factor: Medium
Base Score: 6.4
Temporal Score: 5
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N
Temporal Vector: E:POC/RL:OF/RC:C
CVSS Score Source: CVE-2013-0235
CPE: cpe:/a:wordpress:wordpress
Required KB Items: installed_sw/WordPress, www/PHP
Exploit Ease: No exploit is required
Exploited by Nessus: true
Patch Publication Date: 1/24/2013
Vulnerability Publication Date: 12/11/2012
CVE: CVE-2013-0235
BID: 57554