Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Gentoo Local Security Checks >> [GLSA-200603-01] WordPress: SQL injection vulnerability


Vulnerability Assessment Details

[GLSA-200603-01] WordPress: SQL injection vulnerability

Vulnerability Assessment Summary
WordPress: SQL injection vulnerability

Detailed Explanation for this Vulnerability Assessment
The remote host is affected by the vulnerability described in GLSA-200603-01
(WordPress: SQL injection vulnerability)


Patrik Karlsson reported that WordPress 1.5.2 makes use of an
insufficiently filtered User Agent string in SQL queries related to
comments posting. This vulnerability was already fixed in the
2.0-series of WordPress.

Impact

A possible hacker could send a comment with a malicious User Agent
parameter, resulting in SQL injection and potentially in the subversion
of the WordPress database. This vulnerability wouldn't affect WordPress
sites which do not permit comments or which require that comments go
through a moderator.

Workaround

Disable or moderate comments on your WordPress blogs.


Solution:
All WordPress users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/wordpress-2.0.1"


Network Security Threat Level: Medium


Networks Security ID:

Vulnerability Assessment Copyright: (C) 2006 Michel Arboi

Cables, Connectors

Juniper EX4550-32F-AFO Juniper EX4550 Switch 32-Port 1/10G SFP+
$3995.0
Juniper EX4550-32F-AFO Juniper EX4550 Switch 32-Port 1/10G SFP+  pictureJUNIPER SECURE ACCESS 2500 BASE SYSTEM - SA2500
$730.59
JUNIPER SECURE ACCESS 2500 BASE SYSTEM - SA2500 pictureJUNIPER MODULR FOR M10I M7I - STM-1/OC-3 SONET MMF - 710-002779 - 750-002971
$132.84
JUNIPER MODULR FOR M10I M7I - STM-1/OC-3 SONET MMF - 710-002779 - 750-002971 pictureJuniper CWDM-XFP10G-20SP Compatible 1270nm 20km DOM Transceiver
$106.99
Juniper CWDM-XFP10G-20SP Compatible 1270nm 20km DOM Transceiver picture


Discussions

No Discussions have been posted on this vulnerability.