WordPress < 3.1.4 / 3.2-RC3 Multiple Blind SQL Injection Vulnerabilities

medium Nessus Plugin ID 56620

Synopsis

The remote web server contains a PHP application with multiple blind SQL injection vulnerabilities.

Description

The remote web server hosts a version of WordPress prior to 3.1.4 / 3.2-RC3. It is reportedly affected by multiple SQL injection vulnerabilities due to a failure to adequately sanitize user-supplied input prior to using it in database queries.

Solution

Upgrade WordPress to version 3.1.4 or 3.2-RC3.

See Also

http://www.nessus.org/u?50d3d20a

Plugin Details

Severity: Medium

ID: 56620

File Name: wordpress_3_1_4.nasl

Version: 1.11

Type: remote

Family: CGI abuses

Published: 10/24/2011

Updated: 6/5/2024

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Enable CGI Scanning: true

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Required KB Items: installed_sw/WordPress, www/PHP, Settings/ParanoidReport

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/29/2011

Vulnerability Publication Date: 6/21/2011

Reference Information

BID: 48521