| Vulnerability Name: | CCN-33761 | ||||||
| Published: | 2007-04-19 | ||||||
| Updated: | 2007-04-19 | ||||||
| Summary: | WordPress is vulnerable to a denial of service, caused by the improper handling of pingback URLs. The maximum size of files to be downloaded during the pingback process is not specified, which could allow a remote attacker to send multiple pingbacks with URLs to a large file and consume available resources, resulting in a denial of service. | ||||||
| CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
| ||||||
| CVSS v2 Severity: | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P) 4.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:U/RC:UR)
| ||||||
| Vulnerability Consequences: | Denial of Service | ||||||
| References: | Source: CCN Type: SA24951 WordPress Pingback Denial of Service Security Issue Source: CCN Type: WordPress trac Web site Pingback DDOS possibility Source: CCN Type: OSVDB ID: 34352 WordPress Pingback Large File Handling DoS Source: XF Type: UNKNOWN wordpress-pingback-urls-dos(33761) | ||||||
| Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
| BACK | |||||||