CVE-2008-0191

WordPress 2.2.x and 2.3.x allows remote attackers to obtain sensitive information via an invalid p parameter in an rss2 action to the default URI, which reveals the full path and the SQL database structure.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:41

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html - () http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html -
References () http://securityreason.com/securityalert/3539 - () http://securityreason.com/securityalert/3539 -
References () http://securityvulns.ru/Sdocument663.html - () http://securityvulns.ru/Sdocument663.html -
References () http://websecurity.com.ua/1634/ - () http://websecurity.com.ua/1634/ -
References () http://www.securityfocus.com/archive/1/485786/100/0/threaded - () http://www.securityfocus.com/archive/1/485786/100/0/threaded -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/39423 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/39423 -

Information

Published : 2008-01-10 00:46

Updated : 2024-11-21 00:41


NVD link : CVE-2008-0191

Mitre link : CVE-2008-0191

CVE.ORG link : CVE-2008-0191


JSON object : View

Products Affected

wordpress

  • wordpress
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor