WordPress <= 2.3.3 'index.php' Arbitrary File Access

Medium Nessus Network Monitor Plugin ID 4482

Synopsis

The remote host is vulnerable to a flaw that allows attackers to retrieve sensitive files or data.

Description

The version of WordPress installed on the remote host is vulnerable to a directory traversal attack. An attacker exploiting this flaw would send malformed data to the 'cat' parameter of the 'index.php' script. Successful exploitation would result in the attacker gaining access to confidential files on the target server.

Solution

Upgrade to WordPress 2.5, or higher.

See Also

http://wordpress.org

Plugin Details

Severity: Medium

ID: 4482

File Name: 4482.prm

Family: CGI

Published: 2008/04/21

Modified: 2016/11/23

Dependencies: 9035

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 5.3

Temporal Score: 4.9

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Reference Information

CVE: CVE-2008-4769

BID: 28845