Executive Summary
Summary | |
---|---|
Title | New wordpress packages fix several vulnerabilities |
Informations | |||
---|---|---|---|
Name | DSA-1564 | First vendor Publication | 2008-05-01 |
Vendor | Debian | Last vendor Modification | 2008-05-01 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
Several remote vulnerabilities have been discovered in wordpress, a weblog manager. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-3639 Insufficient input sanitising allowed for remote attackers to redirect visitors to external websites. CVE-2007-4153 Multiple cross-site scripting vulnerabilities allowed remote authenticated administrators to inject arbitrary web script or HTML. CVE-2007-4154 SQL injection vulnerability allowed allowed remote authenticated administrators to execute arbitrary SQL commands. CVE-2007-0540 WordPress allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a file with a binary content type, which is downloaded even though it cannot contain usable pingback data. [no CVE name yet] Insufficient input sanitising caused an attacker with a normal user account to access the administrative interface. For the stable distribution (etch), these problems have been fixed in version 2.0.10-1etch2. For the unstable distribution (sid), these problems have been fixed in version 2.2.3-1. We recommend that you upgrade your wordpress package. |
Original Source
Url : http://www.debian.org/security/2008/dsa-1564 |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:18483 | |||
Oval ID: | oval:org.mitre.oval:def:18483 | ||
Title: | DSA-1564-1 wordpress - several vulnerabilities | ||
Description: | Several remote vulnerabilities have been discovered in WordPress, a weblog manager. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1564-1 CVE-2007-3639 CVE-2007-4153 CVE-2007-4154 CVE-2007-0540 | Version: | 7 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | wordpress |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:7845 | |||
Oval ID: | oval:org.mitre.oval:def:7845 | ||
Title: | DSA-1564 wordpress -- multiple vulnerabilities | ||
Description: | Several remote vulnerabilities have been discovered in WordPress, a weblog manager. The Common Vulnerabilities and Exposures project identifies the following problems: Insufficient input sanitising allowed for remote attackers to redirect visitors to external websites. Multiple cross-site scripting vulnerabilities allowed remote authenticated administrators to inject arbitrary web script or HTML. SQL injection vulnerability allowed allowed remote authenticated administrators to execute arbitrary SQL commands. WordPress allows remote attackers to cause a denial of service (bandwidth or thread consumption) via pingback service calls with a source URI that corresponds to a file with a binary content type, which is downloaded even though it cannot contain usable pingback data. Insufficient input sanitising caused an attacker with a normal user account to access the administrative interface. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1564 CVE-2007-3639 CVE-2007-4153 CVE-2007-4154 CVE-2007-0540 | Version: | 3 |
Platform(s): | Debian GNU/Linux 4.0 | Product(s): | wordpress |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-05-12 | Name : Debian Security Advisory DSA 1564-1 (wordpress) File : nvt/deb_1564_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
46995 | WordPress Admin Panel link-import.php opml_url Parameter XSS |
46994 | WordPress Admin Panel options.php Options Database Table XSS |
40802 | WordPress wp-pass.php _wp_http_referer Variable Arbitrary Site Redirect |
39377 | Wordpress options-misc.php page_options Parameter SQL Injection Wordpress contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'options-misc.php' script not properly sanitizing user-supplied input to the 'page_options' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database. |
39376 | Wordpress options-permalink.php page_options Parameter SQL Injection Wordpress contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'options-permalink.php' script not properly sanitizing user-supplied input to the 'page_options' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database. |
39375 | Wordpress options-privacy.php page_options Parameter SQL Injection Wordpress contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'options-privacy.php' script not properly sanitizing user-supplied input to the 'page_options' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database. |
39374 | Wordpress options-discussion.php page_options Parameter SQL Injection Wordpress contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'options-discussion.php' script not properly sanitizing user-supplied input to the 'page_options' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database. |
39373 | Wordpress options-reading.php page_options Parameter SQL Injection Wordpress contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'options-reading.php' script not properly sanitizing user-supplied input to the 'page_options' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database. |
39372 | Wordpress options-writing.php page_options Parameter SQL Injection Wordpress contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'options-writing.php' script not properly sanitizing user-supplied input to the 'page_options' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database. |
39371 | Wordpress options-general.php page_options Parameter SQL Injection Wordpress contains a flaw that may allow an attacker to carry out an SQL injection attack. The issue is due to the 'options-general.php' script not properly sanitizing user-supplied input to the 'page_options' variable. This may allow an attacker to inject or manipulate SQL queries in the back-end database. |
33006 | WordPress Pingback Crafted URI Binary Content DoS |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2008-05-02 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1564.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:27:36 |
|