Language:
https://wordpress.org/news/2013/01/wordpress-3-5-1/
https://codex.wordpress.org/Version_3.5.1
https://github.com/FireFart/WordpressPingbackPortScanner
https://www.securityfocus.com/archive/1/525045/30/0/threaded
http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
Severity: Medium
ID: 64452
File Name: wordpress_3_5_1.nasl
Version: 1.14
Type: remote
Family: CGI abuses
Published: 2/4/2013
Updated: 6/6/2024
Configuration: Enable paranoid mode
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Factor: Medium
Score: 4.8
Risk Factor: Medium
Base Score: 6.4
Temporal Score: 4.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N
CVSS Score Source: CVE-2013-0235
CPE: cpe:/a:wordpress:wordpress
Required KB Items: installed_sw/WordPress, www/PHP, Settings/ParanoidReport
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
Patch Publication Date: 1/24/2013
Vulnerability Publication Date: 12/11/2012