[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-2667Date: (C)2006-05-30   (M)2023-12-22


Direct static code injection vulnerability in WordPress 2.0.2 and earlier allows remote attackers to execute arbitrary commands by inserting a carriage return and PHP code when updating a profile, which is appended after a special comment sequence into files in (1) wp-content/cache/userlogins/ (2) wp-content/cache/users/ which are later included by cache.php, as demonstrated using the displayname argument.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
BID-18372
http://www.securityfocus.com/archive/1/435039/100/0/threaded
SECUNIA-20271
SECUNIA-20608
OSVDB-25777
ADV-2006-1992
GLSA-200606-08
http://retrogod.altervista.org/wordpress_202_xpl.html
wordpress-user-profile-code-injection(26687)

CPE    1
cpe:/a:wordpress:wordpress

© SecPod Technologies