Lucene search

K
patchstackN/APATCHSTACK:1BD16B094D84675D3BCABB338B2526FE
HistoryJun 08, 2005 - 12:00 a.m.

WordPress <= 1.3.0 - Eval Injection

2005-06-0800:00:00
N/A
patchstack.com
7

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

Because of this vulnerability in PEAR XML_RPC, attackers can execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.

Solution

           Update the WordPress to the latest available version (at least 1.4).
CPENameOperatorVersion
wordpresseq1.3

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P