Lucene search

K
patchstackCore SecurityPATCHSTACK:9514150A05D896485A9A8785FBFE7528
HistoryJul 10, 2009 - 12:00 a.m.

WordPress - Privileges Unchecked in admin.php and Multiple Information

2009-07-1000:00:00
Core Security
patchstack.com
8

4.9 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N

This WordPress vulnerability was found in the way that WordPress handles some URL
requests. It results the content of plugins configuration pages in some plugins modifying plugin options, unprivileged users viewing and injecting JavaScript code.
The code is abitrary and it may be run by a malicious attacker, if the administrator of the blog runs injected JavasScript code that edits blogโ€™s PHP code. Most of all the blogs that are powered by WordPress and hosted outside โ€œWordPress.comโ€, let any person to create unprivileged users that are called subscribers.
Also, there disclosure of important usernameโ€™s information were found in WordPress.

Solution

           A vulnerability may be mitigated by controlling access to file that is inside the "wp-admin" folder. It can be done by using Apache access control mechanism, in other words, ".htaccess" file. 
CPENameOperatorVersion
wordpressle2.8

4.9 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:S/C:P/I:P/A:N