Executive Summary

Informations
Name CVE-2008-0664 First vendor Publication 2008-02-07
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:N)
Cvss Base Score 6.4 Attack Range Network
Cvss Impact Score 4.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

The XML-RPC implementation (xmlrpc.php) in WordPress before 2.3.3, when registration is enabled, allows remote attackers to edit posts of other blog users via unknown vectors.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0664

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-264 Permissions, Privileges, and Access Controls

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:20223
 
Oval ID: oval:org.mitre.oval:def:20223
Title: DSA-1601-1 wordpress - several vulnerabilities
Description: Several remote vulnerabilities have been discovered in Wordpress, the weblog manager.
Family: unix Class: patch
Reference(s): DSA-1601-1
CVE-2007-1599
CVE-2008-0664
Version: 5
Platform(s): Debian GNU/Linux 4.0
Product(s): wordpress
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:8095
 
Oval ID: oval:org.mitre.oval:def:8095
Title: DSA-1601 wordpress -- several vulnerabilities
Description: Several remote vulnerabilities have been discovered in Wordpress, the weblog manager. The Common Vulnerabilities and Exposures project identifies the following problems: WordPress allows remote attackers to redirect authenticated users to other websites and potentially obtain sensitive information. The XML-RPC implementation, when registration is enabled, allows remote attackers to edit posts of other blog users.
Family: unix Class: patch
Reference(s): DSA-1601
CVE-2007-1599
CVE-2008-0664
Version: 3
Platform(s): Debian GNU/Linux 4.0
Product(s): wordpress
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 38

OpenVAS Exploits

Date Description
2009-02-16 Name : Fedora Update for wordpress FEDORA-2008-1512
File : nvt/gb_fedora_2008_1512_wordpress_fc7.nasl
2009-02-16 Name : Fedora Update for wordpress FEDORA-2008-1559
File : nvt/gb_fedora_2008_1559_wordpress_fc8.nasl
2008-07-15 Name : Debian Security Advisory DSA 1601-1 (wordpress)
File : nvt/deb_1601_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
41136 WordPress XML-RPC xmlrpc.php Unauthenticated Post Modification

Nessus® Vulnerability Scanner

Date Description
2008-07-08 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1601.nasl - Type : ACT_GATHER_INFO
2008-02-14 Name : The remote Fedora host is missing a security update.
File : fedora_2008-1512.nasl - Type : ACT_GATHER_INFO
2008-02-14 Name : The remote Fedora host is missing a security update.
File : fedora_2008-1559.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://secunia.com/advisories/28823
http://secunia.com/advisories/28920
http://secunia.com/advisories/30960
http://wordpress.org/development/2008/02/wordpress-233/
http://www.debian.org/security/2008/dsa-1601
http://www.securityfocus.com/bid/27669
http://www.securitytracker.com/id?1019316
http://www.village-idiot.org/archives/2008/02/02/wordpress-232-exploit-confir...
http://www.vupen.com/english/advisories/2008/0448
https://bugzilla.redhat.com/show_bug.cgi?id=431547
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg0034...
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg0041...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Date Informations
2024-11-28 23:15:09
  • Multiple Updates
2024-11-28 12:14:49
  • Multiple Updates
2024-08-02 12:08:39
  • Multiple Updates
2024-08-02 01:02:35
  • Multiple Updates
2024-02-02 01:08:15
  • Multiple Updates
2024-02-01 12:02:34
  • Multiple Updates
2023-09-05 12:07:41
  • Multiple Updates
2023-09-05 01:02:25
  • Multiple Updates
2023-09-02 12:07:47
  • Multiple Updates
2023-09-02 01:02:26
  • Multiple Updates
2023-08-12 12:09:09
  • Multiple Updates
2023-08-12 01:02:26
  • Multiple Updates
2023-08-11 12:07:50
  • Multiple Updates
2023-08-11 01:02:31
  • Multiple Updates
2023-08-06 12:07:30
  • Multiple Updates
2023-08-06 01:02:27
  • Multiple Updates
2023-08-04 12:07:35
  • Multiple Updates
2023-08-04 01:02:30
  • Multiple Updates
2023-07-14 12:07:33
  • Multiple Updates
2023-07-14 01:02:27
  • Multiple Updates
2023-03-29 01:08:32
  • Multiple Updates
2023-03-28 12:02:33
  • Multiple Updates
2022-10-11 12:06:42
  • Multiple Updates
2022-10-11 01:02:18
  • Multiple Updates
2021-05-04 12:07:05
  • Multiple Updates
2021-04-22 01:07:32
  • Multiple Updates
2020-05-23 00:21:14
  • Multiple Updates
2019-06-11 12:02:26
  • Multiple Updates
2016-04-26 17:06:10
  • Multiple Updates
2014-02-17 10:43:43
  • Multiple Updates
2013-05-11 00:08:54
  • Multiple Updates