Описание
SQL injection vulnerability in xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users to execute arbitrary SQL commands via a string parameter value in an XML RPC mt.setPostCategories method call, related to the post_id variable.
SQL injection vulnerability in xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users to execute arbitrary SQL commands via a string parameter value in an XML RPC mt.setPostCategories method call, related to the post_id variable.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2007-1897
- https://www.exploit-db.com/exploits/3656
- http://secunia.com/advisories/24751
- http://secunia.com/advisories/25108
- http://trac.wordpress.org/ticket/4091
- http://www.debian.org/security/2007/dsa-1285
- http://www.notsosecure.com/folder2/2007/04/03/wordpress-212-xmlrpc-security-issues
- http://www.securityfocus.com/bid/23294
- http://www.vupen.com/english/advisories/2007/1245
Связанные уязвимости
SQL injection vulnerability in xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users to execute arbitrary SQL commands via a string parameter value in an XML RPC mt.setPostCategories method call, related to the post_id variable.
SQL injection vulnerability in xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users to execute arbitrary SQL commands via a string parameter value in an XML RPC mt.setPostCategories method call, related to the post_id variable.
SQL injection vulnerability in xmlrpc (xmlrpc.php) in WordPress 2.1.2, ...