| Vulnerability Name: | CVE-2007-4139 (CCN-35718) | ||||||||
| Assigned: | 2007-07-31 | ||||||||
| Published: | 2007-07-31 | ||||||||
| Updated: | 2017-07-29 | ||||||||
| Summary: | Cross-site scripting (XSS) vulnerability in the Temporary Uploads editing functionality (wp-admin/includes/upload.php) in WordPress 2.2.1, allows remote attackers to inject arbitrary web script or HTML via the style parameter to wp-admin/upload.php. | ||||||||
| CVSS v3 Severity: | 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||
| CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
2.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C)
| ||||||||
| Vulnerability Type: | CWE-79 | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: MITRE Type: CNA CVE-2007-4139 Source: CCN Type: mybeNi websecurity blog: July 31st, 2007 7. Wordpress /upload.php XSS Vulnerability Source: MISC Type: Exploit http://mybeni.rootzilla.de/mybeNi/2007/wordpress_zeroday_vulnerability_roundhouse_kick_and_why_i_nearly_wrote_the_first_blog_worm/ Source: OSVDB Type: UNKNOWN 36621 Source: CCN Type: SA26296 WordPress "style" Cross-Site Scripting Source: SECUNIA Type: Vendor Advisory 26296 Source: CONFIRM Type: UNKNOWN http://trac.wordpress.org/attachment/ticket/4689/4689.diff Source: CCN Type: Wordpress trac Ticket #4689 Wordpress uploads.php Cross-Site Scripting Vulnerability Source: CONFIRM Type: Exploit http://trac.wordpress.org/ticket/4689 Source: CCN Type: OSVDB ID: 36621 WordPress wp-admin/includes/upload.php style Parameter XSS Source: BID Type: UNKNOWN 25158 Source: CCN Type: BID-25158 WordPress Upload.PHP Cross-Site Scripting Vulnerability Source: CCN Type: BID-25161 WordPress Multiple Input Validation Vulnerabilities Source: VUPEN Type: UNKNOWN ADV-2007-2744 Source: XF Type: UNKNOWN wordpress-upload-xss(35718) Source: XF Type: UNKNOWN wordpress-upload-xss(35718) | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||