wp-includes/functions.php in WordPress before 3.6.1 does not properly determine whether data has been serialized, which allows remote attackers to execute arbitrary code by triggering erroneous PHP unserialize operations.
References
Configurations
History
21 Nov 2024, 01:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://codex.wordpress.org/Version_3.6.1 - Vendor Advisory | |
References | () http://core.trac.wordpress.org/changeset/25325 - Exploit, Patch | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116828.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2013-September/116832.html - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2013-September/117118.html - | |
References | () http://wordpress.org/news/2013/09/wordpress-3-6-1/ - Patch, Vendor Advisory | |
References | () http://www.debian.org/security/2013/dsa-2757 - |
Information
Published : 2013-09-12 13:28
Updated : 2024-11-21 01:55
NVD link : CVE-2013-4338
Mitre link : CVE-2013-4338
CVE.ORG link : CVE-2013-4338
JSON object : View
Products Affected
wordpress
- wordpress
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')