WordPress < 2.1 Pingback Information Disclosure

medium Nessus Network Monitor Plugin ID 3890

Synopsis

The remote host is vulnerable to multiple attack vectors.

Description

The version of WordPress installed on the remote host fails to sanitize the 'sourceURI' before passing it to the 'wp_remote_fopen()' function when processing pingbacks. An unauthenticated remote attacker can leverage this issue to determine the existence of local files and possibly even to view parts of those files, subject to the permissions of the web server user ID. In addition, the version is also reportedly susceptible to a denial of service attack because it allows an anonymous attacker to cause a server to fetch arbitrary URLs without limits.

Solution

Upgrade to WordPress 2.1, or later.

See Also

http://www.securityfocus.com/archive/1/458003/30/0/threaded

http://comox.textdrive.com/pipermail/wp-svn/2007-January/002387.html

http://wordpress.org

Plugin Details

Severity: Medium

ID: 3890

Family: CGI

Published: 1/24/2007

Updated: 3/6/2019

Nessus ID: 24237

Risk Information

VPR

Risk Factor: Low

Score: 2.5

CVSS v2

Risk Factor: Medium

Base Score: 5.8

Temporal Score: 4.8

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: Medium

Base Score: 6.3

Temporal Score: 5.9

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Reference Information

CVE: CVE-2007-0541

BID: 22220