Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2006-0986

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2006-0986
Last Modified 07 Mar 2011 09:31:31
Published 03 Mar 2006 06:02:00
Confidentiality Impact NONE NONE
Integrity Impact PARTIAL PARTIAL
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2006-0986

Summary

WordPress 2.0.1 and earlier allows remote attackers to obtain sensitive information via a direct request to (1) default-filters.php, (2) template-loader.php, (3) rss-functions.php, (4) locale.php, (5) wp-db.php, and (6) kses.php in the wp-includes/ directory; and (7) edit-form-advanced.php, (8) admin-functions.php, (9) edit-link-form.php, (10) edit-page-form.php, (11) admin-footer.php, and (12) menu.php in the wp-admin directory; and possibly (13) list directory contents of the wp-includes directory. NOTE: the vars.php, edit-form.php, wp-settings.php, and edit-form-comment.php vectors are already covered by CVE-2005-4463. The menu-header.php vector is already covered by CVE-2005-2110. Other vectors might be covered by CVE-2005-1688. NOTE: if the typical installation of WordPress does not list any site-specific files to wp-includes, then vector [13] is not an exposure.

Vulnerable Systems

Application

  • Wordpress 1.0

  • Wordpress 1.0.1

  • Wordpress 1.0.2

  • Wordpress 1.2

  • Wordpress 1.5

  • Wordpress 1.5.1

  • Wordpress 1.5.1.2

  • Wordpress 1.5.1.3

  • Wordpress 2.0

  • Wordpress 2.0.1


References

BUGTRAQ - 20060227 WordPress 2.0.1 Multiple Vulnerabilities

MISC - http://NeoSecurityTeam.net/advisories/Advisory-17.txt

VUPEN - ADV-2006-0777

BUGTRAQ - 20060302 Re: FW: WordPress 2.0.1 Multiple Vulnerabilities

BUGTRAQ - 20060228 FW: WordPress 2.0.1 Multiple Vulnerabilities

SECUNIA - 19050


Last Updated: 27 May 2016 10:41:52