Описание
WordPress allows remote attackers to determine the existence of arbitrary files, and possibly read portions of certain files, via pingback service calls with a source URI that corresponds to a local pathname, which triggers different fault codes for existing and non-existing files, and in certain configurations causes a brief file excerpt to be published as a blog comment.
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | not-affected | |
edgy | ignored | end of life, was needed |
feisty | not-affected | |
gutsy | not-affected | |
hardy | not-affected | |
intrepid | not-affected | |
jaunty | not-affected | |
karmic | not-affected | |
upstream | released | 2.0.8 |
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
Связанные уязвимости
WordPress allows remote attackers to determine the existence of arbitrary files, and possibly read portions of certain files, via pingback service calls with a source URI that corresponds to a local pathname, which triggers different fault codes for existing and non-existing files, and in certain configurations causes a brief file excerpt to be published as a blog comment.
WordPress allows remote attackers to determine the existence of arbitr ...
WordPress allows remote attackers to determine the existence of arbitrary files, and possibly read portions of certain files, via pingback service calls with a source URI that corresponds to a local pathname, which triggers different fault codes for existing and non-existing files, and in certain configurations causes a brief file excerpt to be published as a blog comment.
EPSS
5 Medium
CVSS2