Vulnerability Name:

CCN-39435

Published:2008-01-03
Updated:2008-01-03
Summary:WordPress could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request to the template.php script containing "dot dot backslash" sequences (..\) in the file parameter to view and edit arbitrary files on the system.
CVSS v3 Severity:6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
6.1 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N/E:H/RL:U/RC:UR)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Consequences:File Manipulation
References:Source: CCN
Type: BugTraq Mailing List, Thu, 3 Jan 2008 23:50:08 +0300
securityvulns.com russian vulnerabilities digest

Source: CCN
Type: Securityvulns Web site
Arbitrary file edit, Local file include, Directory traversal and Full path disclosure in WordPress

Source: CCN
Type: WordPress Web site
WordPress

Source: XF
Type: UNKNOWN
wordpress-template-directory-traversal(39435)

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:wordpress:wordpress:2.0.11:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    wordpress wordpress 2.0.11