Multiple SQL injection vulnerabilities in Wordpress before 2.2.3 and Wordpress multi-user (MU) before 1.2.5a allow remote attackers to execute arbitrary SQL commands via the post_type parameter to the pingback.extensions.getPingbacks method in the XMLRPC interface, and other unspecified parameters related to "early database escaping" and missing validation of "query string like parameters."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:36
Type | Values Removed | Values Added |
---|---|---|
References | () http://fedoranews.org/updates/FEDORA-2007-214.shtml - | |
References | () http://secunia.com/advisories/26771 - Vendor Advisory | |
References | () http://secunia.com/advisories/26796 - Vendor Advisory | |
References | () http://trac.wordpress.org/ticket/4770 - | |
References | () http://wordpress.org/development/2007/09/wordpress-223/ - Patch | |
References | () http://www.buayacorp.com/files/wordpress/wordpress-sql-injection-advisory.html - | |
References | () http://www.vupen.com/english/advisories/2007/3132 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=285831 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/36578 - |
Information
Published : 2007-09-14 18:17
Updated : 2024-11-21 00:36
NVD link : CVE-2007-4894
Mitre link : CVE-2007-4894
CVE.ORG link : CVE-2007-4894
JSON object : View
Products Affected
wordpress
- wordpress
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')