Lucene search

K
nessusThis script is Copyright (C) 2012-2024 Tenable Network Security, Inc.WORDPRESS_3_4_1.NASL
HistoryJul 23, 2012 - 12:00 a.m.

WordPress < 3.4.1 Multiple Vulnerabilities

2012-07-2300:00:00
This script is Copyright (C) 2012-2024 Tenable Network Security, Inc.
www.tenable.com
19

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

6.5 Medium

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

70.8%

According to its version number, the WordPress install hosted on the remote web server is affected by multiple vulnerabilities :

  • Version 3.4.0 does not properly restrict access to unfiltered_html when multisite is enabled, which allows for remote administrators or editors to perform cross-site scripting (XSS) attacks.
    (CVE-2012-3383)

  • The application is affected by a cross-site request forgery (CSRF) vulnerability that could allow remote attackers to hijack the authentication of victims via unknown vectors. (CVE-2012-3384)

  • The application is affected by an information disclosure vulnerability due to an error in checking user permissions when handling XMLRPC requests. Successfully exploiting this issue would allow an attacker to edit posts by users with insufficient permissions. (CVE-2012-3385)

Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#

include('deprecated_nasl_level.inc');
include('compat.inc');

if (description)
{
  script_id(60100);
  script_version("1.12");
  script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/06");

  script_cve_id("CVE-2012-3383", "CVE-2012-3384", "CVE-2012-3385");
  script_bugtraq_id(54224);

  script_name(english:"WordPress < 3.4.1 Multiple Vulnerabilities");

  script_set_attribute(attribute:"synopsis", value:
"The remote web server contains a PHP application that is affected by
multiple vulnerabilities.");
  script_set_attribute(attribute:"description", value:
"According to its version number, the WordPress install hosted on the
remote web server is affected by multiple vulnerabilities :

  - Version 3.4.0 does not properly restrict access to
    unfiltered_html when multisite is enabled, which
    allows for remote administrators or editors to
    perform cross-site scripting (XSS) attacks.
    (CVE-2012-3383)

  - The application is affected by a cross-site request
    forgery (CSRF) vulnerability that could allow remote
    attackers to hijack the authentication of victims via
    unknown vectors. (CVE-2012-3384)

  - The application is affected by an information disclosure
    vulnerability due to an error in checking user
    permissions when handling XMLRPC requests. Successfully
    exploiting this issue would allow an attacker to edit
    posts by users with insufficient permissions. 
    (CVE-2012-3385)

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.");
  script_set_attribute(attribute:"see_also", value:"https://wordpress.org/news/2012/06/wordpress-3-4-1/");
  script_set_attribute(attribute:"see_also", value:"https://codex.wordpress.org/Version_3.4.1");
  script_set_attribute(attribute:"solution", value:
"Upgrade to WordPress 3.4.1 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");

  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(20, 74, 79, 442, 629, 711, 712, 722, 725, 750, 751, 800, 801, 809, 811, 864, 900, 928, 931, 990);

  script_set_attribute(attribute:"vuln_publication_date", value:"2012/06/27");
  script_set_attribute(attribute:"patch_publication_date", value:"2011/06/27");
  script_set_attribute(attribute:"plugin_publication_date", value:"2012/07/23");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:wordpress:wordpress");
  script_set_attribute(attribute:"enable_cgi_scanning", value:"true");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");

  script_copyright(english:"This script is Copyright (C) 2012-2024 Tenable Network Security, Inc.");

  script_dependencies("wordpress_detect.nasl");
  script_require_keys("www/PHP", "installed_sw/WordPress", "Settings/ParanoidReport");
  script_exclude_keys("Settings/disable_cgi_scanning");
  script_require_ports("Services/www", 80);

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
include("install_func.inc");

app = "WordPress";
get_install_count(app_name:app, exit_if_zero:TRUE);

port = get_http_port(default:80, php:TRUE);

install = get_single_install(
  app_name : app,
  port     : port,
  exit_if_unknown_ver : TRUE
);

dir = install['path'];
version = install['version'];
install_url = build_url(port:port, qs:dir);

if (report_paranoia < 2) audit(AUDIT_PARANOID);

ver = split(version, sep:".", keep:FALSE);
for (i=0; i<max_index(ver); i++)
  ver[i] = int(ver[i]);

# Versions less than 3.4.1 are vulnerable
if (
  ver[0] < 3 ||
  (ver[0] == 3 && ver[1] < 4) ||
  (ver[0] == 3 && ver[1] == 4 && ver[2] < 1)
)
{
  set_kb_item(name:"www/"+port+"/XSS", value:TRUE);
  set_kb_item(name:"www/"+port+"/XSRF", value:TRUE);

  if (report_verbosity > 0)
  {
    report =
      '\n  URL               : ' +install_url+
      '\n  Installed version : ' +version+
      '\n  Fixed version     : 3.4.1\n';
    security_warning(port:port, extra:report);
  }
  else security_warning(port);
}
else audit(AUDIT_WEB_APP_NOT_AFFECTED, app, install_url, version);
VendorProductVersionCPE
wordpresswordpresscpe:/a:wordpress:wordpress

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

6.5 Medium

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

70.8%