Language:
https://wordpress.org/news/2013/09/wordpress-3-6-1/
https://codex.wordpress.org/Version_3.6.1
https://seclists.org/fulldisclosure/2013/Dec/174
http://www.nessus.org/u?24ef6be5
https://core.trac.wordpress.org/changeset/25321
https://core.trac.wordpress.org/changeset/25322
https://core.trac.wordpress.org/changeset/25323
Severity: High
ID: 69997
File Name: wordpress_3_6_1.nasl
Version: 1.21
Type: remote
Family: CGI abuses
Published: 9/19/2013
Updated: 6/4/2024
Configuration: Enable paranoid mode
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Factor: Medium
Score: 6.7
Risk Factor: High
Base Score: 7.5
Temporal Score: 5.9
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS Score Source: CVE-2013-4339
CPE: cpe:/a:wordpress:wordpress
Required KB Items: www/PHP, installed_sw/WordPress, Settings/ParanoidReport
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Available: true
Exploit Ease: No exploit is required
Patch Publication Date: 9/11/2013
Vulnerability Publication Date: 9/10/2013
CVE: CVE-2013-4338, CVE-2013-4339, CVE-2013-4340, CVE-2013-5738, CVE-2013-5739