Vulnerability Name: | CCN-73917 | ||||||
Published: | 2012-03-11 | ||||||
Updated: | 2012-03-11 | ||||||
Summary: | WordPress could allow a remote attacker to obtain sensitive information. An attacker could send a specially-crafted URL request to the media-upload.php script using an invalid type parameter to cause an error message to be returned containing the full installation path. An attacker could use this information to launch further attacks against the affected system. | ||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||
CVSS v2 Severity: | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 4.7 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:U/RC:UR)
| ||||||
Vulnerability Consequences: | Obtain Information | ||||||
References: | Source: CCN Type: Packet Storm Web site WordPress 3.3.1 Post-Auth Information Disclosure Source: CCN Type: WordPress Web site WordPress Source: XF Type: UNKNOWN wordpress-mediaupload-path-disc(73917) | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |