WordPress <= 2.0.5 wp-trackback.php tb_id Parameter SQL Injection (deprecated)

High Nessus Network Monitor Plugin ID 3881

Synopsis

The remote host is vulnerable to a SQL Injection attack.

Description

The remote host is running WordPress, a web blog manager written in PHP. The remote version of this software is reported to be vulnerable to a flaw where a remote attacker can inject malicious SQL statements into the 'tb_id' parameter of the 'wp-trackback.php' script. An attacker exploiting this flaw would only need to be able to send queries to the remote web server. Successful exploitation would result in the attacker executing arbitrary SQL statements on the database server utilized by WordPress.

Solution

No solution is known at this time.

See Also

http://wordpress.org

Plugin Details

Severity: High

ID: 3881

Family: CGI

Published: 2007/01/10

Modified: 2018/09/16

Dependencies: 1442

Risk Information

Risk Factor: High

CVSSv2

Base Score: 5.8

Temporal Score: 5.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Reference Information

CVE: CVE-2007-0233

BID: 21983