Vulnerability Name:

CVE-2007-4893 (CCN-36576)

Assigned:2007-09-10
Published:2007-09-10
Updated:2017-07-29
Summary:wp-admin/admin-functions.php in Wordpress before 2.2.3 and Wordpress multi-user (MU) before 1.2.5a does not properly verify the unfiltered_html privilege, which allows remote attackers to conduct cross-site scripting (XSS) attacks via modified data to (1) post.php or (2) page.php with a no_filter field.
There is an input validation error in the wp-admin/admin-functions.php script when processing the no_filter parameter.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-352
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2007-4893

Source: FEDORA
Type: UNKNOWN
FEDORA-2007-2143

Source: CCN
Type: WordPress multi-user (MU) Web site
WordPress MU > Home

Source: CCN
Type: SA26771
Wordpress Script Insertion and SQL Injection Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
26771

Source: SECUNIA
Type: UNKNOWN
26796

Source: CONFIRM
Type: UNKNOWN
http://trac.wordpress.org/ticket/4720

Source: CCN
Type: WordPress Web site
WordPress

Source: CONFIRM
Type: UNKNOWN
http://wordpress.org/development/2007/09/wordpress-223/

Source: CCN
Type: Buayacorp Web site
Remote SQL Injection in WordPress and WordPress MU

Source: CCN
Type: OSVDB ID: 37275
Wordpress wp-admin/admin-functions.php unfiltered_html Privilege XSS

Source: BID
Type: UNKNOWN
25639

Source: CCN
Type: BID-25639
WordPress Unfiltered_HTML Field Name HTML Injection Vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2007-3132

Source: MISC
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=285831

Source: XF
Type: UNKNOWN
wordpress-wordpressmu-unfilteredhtml-xss(36576)

Source: XF
Type: UNKNOWN
wordpress-wordpressmu-unfilteredhtml-xss(36576)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:0.71:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:1.2:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0.3:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0.5:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0.6:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0.7:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0.10_rc2:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.1.1:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.1.3:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.1.3_rc2:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.2:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.2.1:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.2_revision5003:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    wordpress wordpress 0.6.2
    wordpress wordpress 0.6.2.1
    wordpress wordpress 0.7
    wordpress wordpress 0.71
    wordpress wordpress 1.2
    wordpress wordpress 1.2.1
    wordpress wordpress 1.2.2
    wordpress wordpress 1.5
    wordpress wordpress 1.5.1
    wordpress wordpress 1.5.1.2
    wordpress wordpress 1.5.1.3
    wordpress wordpress 2.0
    wordpress wordpress 2.0.1
    wordpress wordpress 2.0.2
    wordpress wordpress 2.0.3
    wordpress wordpress 2.0.4
    wordpress wordpress 2.0.5
    wordpress wordpress 2.0.6
    wordpress wordpress 2.0.7
    wordpress wordpress 2.0.10_rc1
    wordpress wordpress 2.0.10_rc2
    wordpress wordpress 2.1.1
    wordpress wordpress 2.1.2
    wordpress wordpress 2.1.3
    wordpress wordpress 2.1.3_rc1
    wordpress wordpress 2.1.3_rc2
    wordpress wordpress 2.2
    wordpress wordpress 2.2.1
    wordpress wordpress 2.2.2
    wordpress wordpress 2.2_revision5002
    wordpress wordpress 2.2_revision5003