WordPress Cookie 'cache_lastpostdate' Parameter PHP Code Injection

medium Nessus Plugin ID 19414

Synopsis

The remote web server contains a PHP script that is affected by a PHP code injection vulnerability.

Description

The installed version of WordPress on the remote host will accept and execute arbitrary PHP code passed to the 'cache_lastpostdate' parameter via cookies if PHP's 'register_globals' setting is enabled.

Solution

Disable PHP's 'register_globals' setting.

See Also

https://seclists.org/fulldisclosure/2005/Aug/232

Plugin Details

Severity: Medium

ID: 19414

File Name: wordpress_cache_lastpostdate_code_injection.nasl

Version: 1.21

Type: remote

Family: CGI abuses

Published: 8/11/2005

Updated: 6/6/2024

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: High

Score: 8.3

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Required KB Items: installed_sw/WordPress, www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 8/9/2005

Exploitable With

Metasploit (WordPress cache_lastpostdate Arbitrary Code Execution)

Reference Information

CVE: CVE-2005-2612

BID: 14533