WordPress < 2.8.6 Multiple Vulnerabilities

medium Nessus Plugin ID 42801

Synopsis

The remote web server contains a PHP application that is affected by multiple vulnerabilities.

Description

According to its version number, the installation of WordPress is affected by multiple vulnerabilities :

- It is possible for an attacker with valid credentials to upload arbitrary files, resulting in arbitrary code execution.

- A cross-site scripting vulnerability exists in 'Press-This'.

Solution

Upgrade to WordPress 2.8.6 or later.

See Also

http://www.nessus.org/u?c5090570

https://www.securityfocus.com/archive/1/507819/30/0/threaded

Plugin Details

Severity: Medium

ID: 42801

File Name: wordpress_2_8_6.nasl

Version: 1.21

Type: remote

Family: CGI abuses

Published: 11/13/2009

Updated: 6/5/2024

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Enable CGI Scanning: true

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Required KB Items: installed_sw/WordPress, www/PHP, Settings/ParanoidReport

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No known exploits are available

Patch Publication Date: 11/11/2009

Vulnerability Publication Date: 11/11/2009

Reference Information

BID: 37005, 37014

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990

Secunia: 37332