WordPress 1.5.1.2 and earlier allows remote attackers to obtain sensitive information via (1) a direct request to menu-header.php or a "1" value in the feed parameter to (2) wp-atom.php, (3) wp-rss.php, or (4) wp-rss2.php, which reveal the path in an error message. NOTE: vector [1] was later reported to also affect WordPress 2.0.1.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://NeoSecurityTeam.net/advisories/Advisory-17.txt - | |
References | () http://marc.info/?l=bugtraq&m=112006967221438&w=2 - | |
References | () http://secunia.com/advisories/15831 - Patch, Vendor Advisory | |
References | () http://www.gulftech.org/?node=research&article_id=00085-06282005 - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/426304/100/0/threaded - |
Information
Published : 2005-07-05 04:00
Updated : 2024-11-20 23:58
NVD link : CVE-2005-2110
Mitre link : CVE-2005-2110
CVE.ORG link : CVE-2005-2110
JSON object : View
Products Affected
wordpress
- wordpress
CWE