Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-0196

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2008-0196
Last Modified 05 Sep 2008 05:34:26
Published 09 Jan 2008 07:46:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact NONE NONE
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2008-0196

Summary

Multiple directory traversal vulnerabilities in WordPress 2.0.11 and earlier allow remote attackers to read arbitrary files via a .. (dot dot) in (1) the page parameter to certain PHP scripts under wp-admin/ or (2) the import parameter to wp-admin/admin.php, as demonstrated by discovering the full path via a request for the \..\..\wp-config pathname; and allow remote attackers to modify arbitrary files via a .. (dot dot) in the file parameter to wp-admin/templates.php.

Vulnerable Systems

Application

  • Wordpress 2.0.11


References

BUGTRAQ - 20080103 securityvulns.com russian vulnerabilities digest

MISC - http://websecurity.com.ua/1687/

MISC - http://websecurity.com.ua/1686/

MISC - http://websecurity.com.ua/1683/

MISC - http://websecurity.com.ua/1679/

MISC - http://securityvulns.ru/Sdocument773.html

MISC - http://securityvulns.ru/Sdocument772.html

MISC - http://securityvulns.ru/Sdocument768.html

MISC - http://securityvulns.ru/Sdocument762.html

SREASON - 3539


Last Updated: 27 May 2016 10:46:42