Vulnerability Name:

CVE-2007-4139 (CCN-35718)

Assigned:2007-07-31
Published:2007-07-31
Updated:2017-07-29
Summary:Cross-site scripting (XSS) vulnerability in the Temporary Uploads editing functionality (wp-admin/includes/upload.php) in WordPress 2.2.1, allows remote attackers to inject arbitrary web script or HTML via the style parameter to wp-admin/upload.php.
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N)
2.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-79
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2007-4139

Source: CCN
Type: mybeNi websecurity blog: July 31st, 2007
7. Wordpress /upload.php XSS Vulnerability

Source: MISC
Type: Exploit
http://mybeni.rootzilla.de/mybeNi/2007/wordpress_zeroday_vulnerability_roundhouse_kick_and_why_i_nearly_wrote_the_first_blog_worm/

Source: OSVDB
Type: UNKNOWN
36621

Source: CCN
Type: SA26296
WordPress "style" Cross-Site Scripting

Source: SECUNIA
Type: Vendor Advisory
26296

Source: CONFIRM
Type: UNKNOWN
http://trac.wordpress.org/attachment/ticket/4689/4689.diff

Source: CCN
Type: Wordpress trac Ticket #4689
Wordpress uploads.php Cross-Site Scripting Vulnerability

Source: CONFIRM
Type: Exploit
http://trac.wordpress.org/ticket/4689

Source: CCN
Type: OSVDB ID: 36621
WordPress wp-admin/includes/upload.php style Parameter XSS

Source: BID
Type: UNKNOWN
25158

Source: CCN
Type: BID-25158
WordPress Upload.PHP Cross-Site Scripting Vulnerability

Source: CCN
Type: BID-25161
WordPress Multiple Input Validation Vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2007-2744

Source: XF
Type: UNKNOWN
wordpress-upload-xss(35718)

Source: XF
Type: UNKNOWN
wordpress-upload-xss(35718)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:wordpress:wordpress:2.2.1:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:wordpress:wordpress:2.2.1:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    wordpress wordpress 2.2.1
    wordpress wordpress 2.2.1