Vulnerability Name: | CVE-2007-1277 (CCN-32804) | ||||||||
Assigned: | 2007-03-02 | ||||||||
Published: | 2007-03-02 | ||||||||
Updated: | 2018-10-16 | ||||||||
Summary: | WordPress 2.1.1, as downloaded from some official distribution sites during February and March 2007, contains an externally introduced backdoor that allows remote attackers to execute arbitrary commands via (1) an eval injection vulnerability in the ix parameter to wp-includes/feed.php, and (2) an untrusted passthru call in the iz parameter to wp-includes/theme.php. This vulnerability is addressed in the following product update: http://wordpress.org/development/2007/03/upgrade-212/ | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-20 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2007-1277 Source: MISC Type: Exploit http://ifsec.blogspot.com/2007/03/wordpress-code-compromised-to-enable.html Source: CCN Type: SA24374 WordPress Command Execution and PHP "eval()" Injection Source: SECUNIA Type: Vendor Advisory 24374 Source: CCN Type: WordPress Web site WordPress Source: CCN Type: WordPress Blog, March 2, 2007 WORDPRESS 2.1.1 DANGEROUS, UPGRADE Source: CONFIRM Type: Vendor Advisory http://wordpress.org/development/2007/03/upgrade-212/ Source: CCN Type: US-CERT VU#214480 WordPress fails to properly sanitize input passed to the ix parameter in wp-includes/feed.php Source: CERT-VN Type: US Government Resource VU#214480 Source: CCN Type: US-CERT VU#641456 WordPress fails to properly sanitize input passed to the iz parameter in wp-includes/theme.php Source: CERT-VN Type: US Government Resource VU#641456 Source: BUGTRAQ Type: UNKNOWN 20070303 WordPress source code compromised to enable remote code execution Source: BID Type: UNKNOWN 22797 Source: CCN Type: BID-22797 Wordpress 2.1.1 Command Execution Backdoor Vulnerability Source: CCN Type: BID-23321 Microsoft Windows Explorer BMP Image Denial of Service Vulnerability Source: VUPEN Type: UNKNOWN ADV-2007-0812 Source: XF Type: UNKNOWN wordpress-feed-code-execution(32804) Source: XF Type: UNKNOWN wordpress-feed-code-execution(32804) Source: XF Type: UNKNOWN wordpress-theme-command-execution(32807) | ||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||
Vulnerability Name: | CVE-2007-1277 (CCN-32807) | ||||||||
Assigned: | 2007-03-02 | ||||||||
Published: | 2007-03-02 | ||||||||
Updated: | 2007-03-02 | ||||||||
Summary: | WordPress could allow a remote attacker to execute arbitrary commands on the system, caused by improper validation of user-supplied input by the theme.php script. A remote attacker could send a specially-crafted request to the theme.php script using the iz parameter to inject and execute malicious shell commands with the privileges of the Web server. | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2007-1277 Source: CCN Type: SA24374 WordPress Command Execution and PHP "eval()" Injection Source: CCN Type: WordPress Web site WordPress Source: CCN Type: WordPress Blog, March 2, 2007 WORDPRESS 2.1.1 DANGEROUS, UPGRADE Source: CCN Type: US-CERT VU#214480 WordPress fails to properly sanitize input passed to the ix parameter in wp-includes/feed.php Source: CCN Type: US-CERT VU#641456 WordPress fails to properly sanitize input passed to the iz parameter in wp-includes/theme.php Source: CCN Type: BID-22797 Wordpress 2.1.1 Command Execution Backdoor Vulnerability Source: XF Type: UNKNOWN wordpress-theme-command-execution(32807) | ||||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||||
BACK |