WordPress 2.1.1, as downloaded from some official distribution sites during February and March 2007, contains an externally introduced backdoor that allows remote attackers to execute arbitrary commands via (1) an eval injection vulnerability in the ix parameter to wp-includes/feed.php, and (2) an untrusted passthru call in the iz parameter to wp-includes/theme.php.
References
Configurations
History
21 Nov 2024, 00:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://ifsec.blogspot.com/2007/03/wordpress-code-compromised-to-enable.html - Exploit | |
References | () http://secunia.com/advisories/24374 - Vendor Advisory | |
References | () http://wordpress.org/development/2007/03/upgrade-212/ - Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/214480 - US Government Resource | |
References | () http://www.kb.cert.org/vuls/id/641456 - US Government Resource | |
References | () http://www.securityfocus.com/archive/1/461794/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/22797 - | |
References | () http://www.vupen.com/english/advisories/2007/0812 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/32804 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/32807 - |
Information
Published : 2007-03-05 20:19
Updated : 2024-11-21 00:27
NVD link : CVE-2007-1277
Mitre link : CVE-2007-1277
CVE.ORG link : CVE-2007-1277
JSON object : View
Products Affected
wordpress
- wordpress
CWE
CWE-20
Improper Input Validation