Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-2334

Опубликовано: 10 июл. 2009
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS2: 4.9

Описание

wp-admin/admin.php in WordPress and WordPress MU before 2.8.1 does not require administrative authentication to access the configuration of a plugin, which allows remote attackers to specify a configuration file in the page parameter to obtain sensitive information or modify this file, as demonstrated by the (1) collapsing-archives/options.txt, (2) akismet/readme.txt, (3) related-ways-to-take-action/options.php, (4) wp-security-scan/securityscan.php, and (5) wp-ids/ids-admin.php files. NOTE: this can be leveraged for cross-site scripting (XSS) and denial of service.

РелизСтатусПримечание
dapper

ignored

end of life
devel

not-affected

2.8.3-2ubuntu1
hardy

ignored

end of life
intrepid

ignored

end of life, was needs-triage
jaunty

ignored

end of life
karmic

not-affected

2.8.3-2ubuntu1
lucid

not-affected

2.8.3-2ubuntu1
maverick

not-affected

2.8.3-2ubuntu1
natty

not-affected

2.8.3-2ubuntu1
oneiric

not-affected

2.8.3-2ubuntu1

Показывать по

Ссылки на источники

EPSS

Процентиль: 95%
0.16387
Средний

4.9 Medium

CVSS2

Связанные уязвимости

redhat
почти 16 лет назад

wp-admin/admin.php in WordPress and WordPress MU before 2.8.1 does not require administrative authentication to access the configuration of a plugin, which allows remote attackers to specify a configuration file in the page parameter to obtain sensitive information or modify this file, as demonstrated by the (1) collapsing-archives/options.txt, (2) akismet/readme.txt, (3) related-ways-to-take-action/options.php, (4) wp-security-scan/securityscan.php, and (5) wp-ids/ids-admin.php files. NOTE: this can be leveraged for cross-site scripting (XSS) and denial of service.

nvd
почти 16 лет назад

wp-admin/admin.php in WordPress and WordPress MU before 2.8.1 does not require administrative authentication to access the configuration of a plugin, which allows remote attackers to specify a configuration file in the page parameter to obtain sensitive information or modify this file, as demonstrated by the (1) collapsing-archives/options.txt, (2) akismet/readme.txt, (3) related-ways-to-take-action/options.php, (4) wp-security-scan/securityscan.php, and (5) wp-ids/ids-admin.php files. NOTE: this can be leveraged for cross-site scripting (XSS) and denial of service.

debian
почти 16 лет назад

wp-admin/admin.php in WordPress and WordPress MU before 2.8.1 does not ...

github
около 3 лет назад

wp-admin/admin.php in WordPress and WordPress MU before 2.8.1 does not require administrative authentication to access the configuration of a plugin, which allows remote attackers to specify a configuration file in the page parameter to obtain sensitive information or modify this file, as demonstrated by the (1) collapsing-archives/options.txt, (2) akismet/readme.txt, (3) related-ways-to-take-action/options.php, (4) wp-security-scan/securityscan.php, and (5) wp-ids/ids-admin.php files. NOTE: this can be leveraged for cross-site scripting (XSS) and denial of service.

EPSS

Процентиль: 95%
0.16387
Средний

4.9 Medium

CVSS2