Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checks for multiple vulnerabilities in WordPress < 1.5.1
Detailed Explanation for this Vulnerability Assessment
The remote web server contains multiple PHP scripts that are prone to
SQL injection and cross-site scripting attacks.
The version of WordPress installed on the remote host suffers from
- A SQL Injection Vulnerability
WordPress fails to properly sanitize user input passed
via the 'tb_id' parameter to the 'wp-trackback.php'
script before using it in database queries. This
could lead to disclosure of sensitive information or
even attacks against the underlying database.
- Multiple Cross-Site Scripting Vulnerabilities.
A possible hacker can pass arbitrary HTML and script code
through the 's' parameter of the 'wp-admin/edit.php'
script or the 'p' parameter in the 'wp-admin/post.php'
script, thereby facilitating cross-site scripting
attacks. Note, though, that these attacks will
only be successful against administrators since the
scripts themselves are limited to administrators.
See also :
Upgrade to WordPress version 1.5.1 or later.
Network Security Threat Level:
Medium / CVSS Base Score : 5
Networks Security ID: 13655, 13663, 13664
Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security
|Lot of 2 Oracle Sun Blade 6000 Modular Systems | 594-4829-01 541-2665-01
|Dell PowerEdge M610 Blade Server 2xSix-Core Xeon 3.33GHz + 72GB RAM + 2x1TB SAS
|IBM 8853-21X BLADE CENTER 1x Xeon SL6VP 3066DP 3.06 1GB+HDD 40GB Blade Server
|HP BL465C G7 BLADE SERVER 12 CORE OPTERON 2.2GHz 64GB RAM 146GB SAS HARD DRIVE
No Discussions have been posted on this vulnerability.