Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2009-2852

Overview

Vulnerability Score 6.8 6.8
CVE Id CVE-2009-2852
Last Modified 04 Sep 2009 01:28:44
Published 18 Aug 2009 05:00:00
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact PARTIAL PARTIAL
Availability Impact PARTIAL PARTIAL
Access Vector NETWORK
Access Complexity MEDIUM
Authentication NONE

CVE-2009-2852

Summary

WP-Syntax plugin 0.9.1 and earlier for Wordpress, with register_globals enabled, allows remote attackers to execute arbitrary PHP code via the test_filter[wp_head] array parameter to test/index.php, which is used in a call to the call_user_func_array function.

Vulnerable Systems

Application

  • Ryan.mcgeary Wp-syntax 0.9.1


References

XF - wpsyntax-index-code-execution(52457)

VUPEN - ADV-2009-2456

BID - 36040

MILW0RM - 9431


Last Updated: 27 May 2016 10:51:02