Language:
https://github.com/FireFart/WordpressPingbackPortScanner
https://www.securityfocus.com/archive/1/525045/30/0/threaded
http://lab.onsec.ru/2013/01/wordpress-xmlrpc-pingback-additional.html
Severity: Medium
ID: 64453
File Name: wordpress_xmlrpc_pingback_request_forgery.nasl
Version: 1.13
Type: remote
Family: CGI abuses
Published: 2/4/2013
Updated: 6/5/2024
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Factor: Medium
Score: 4.8
Risk Factor: Medium
Base Score: 6.4
Temporal Score: 5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N
CVSS Score Source: CVE-2013-0235
CPE: cpe:/a:wordpress:wordpress
Required KB Items: installed_sw/WordPress, www/PHP
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
Exploited by Nessus: true
Patch Publication Date: 1/24/2013
Vulnerability Publication Date: 12/11/2012
CVE: CVE-2013-0235
BID: 57554