WordPress < 1.2.2 Multiple Vulnerabilities

high Nessus Plugin ID 15988

Synopsis

The remote web server contains several PHP scripts that are prone to SQL injection and cross-site scripting attacks.

Description

According to its banner, the remote host has a version of WordPress that is is vulnerable to various flaws which may allow an attacker to perform an HTML injection attack against the remote host or allow an attacker to execute arbitrary SQL statements against the remote database.

Solution

Upgrade to WordPress 1.2.2 or greater.

See Also

https://www.securityfocus.com/archive/1/384659

https://wordpress.org/news/2004/12/one-point-two-two/

Plugin Details

Severity: High

ID: 15988

File Name: wordpress_flaws2.nasl

Version: 1.26

Type: remote

Family: CGI abuses

Published: 12/16/2004

Updated: 6/5/2024

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Enable CGI Scanning: true

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Required KB Items: installed_sw/WordPress, www/PHP, Settings/ParanoidReport

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Patch Publication Date: 12/15/2004

Vulnerability Publication Date: 12/15/2004

Reference Information

BID: 11984

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990