WordPress <= 2.0.5 wp-trackback.php tb_id Parameter SQL Injection (deprecated)

high Nessus Network Monitor Plugin ID 3881

Synopsis

The remote host is vulnerable to a SQL Injection attack.

Description

The remote host is running WordPress, a web blog manager written in PHP. The remote version of this software is reported to be vulnerable to a flaw where a remote attacker can inject malicious SQL statements into the 'tb_id' parameter of the 'wp-trackback.php' script. An attacker exploiting this flaw would only need to be able to send queries to the remote web server. Successful exploitation would result in the attacker executing arbitrary SQL statements on the database server utilized by WordPress.

Solution

No solution is known at this time.

See Also

http://wordpress.org

Plugin Details

Severity: High

ID: 3881

Family: CGI

Published: 1/10/2007

Updated: 9/16/2018

Risk Information

VPR

Risk Factor: Medium

Score: 6.1

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 5.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Reference Information

CVE: CVE-2007-0233

BID: 21983