Vulnerability Name:

CVE-2007-4894 (CCN-36578)

Assigned:2007-09-10
Published:2007-09-10
Updated:2017-07-29
Summary:Multiple SQL injection vulnerabilities in Wordpress before 2.2.3 and Wordpress multi-user (MU) before 1.2.5a allow remote attackers to execute arbitrary SQL commands via the post_type parameter to the pingback.extensions.getPingbacks method in the XMLRPC interface, and other unspecified parameters related to "early database escaping" and missing validation of "query string like parameters."
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
6.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
6.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-89
Vulnerability Consequences:Data Manipulation
References:Source: MITRE
Type: CNA
CVE-2007-4894

Source: FEDORA
Type: UNKNOWN
FEDORA-2007-2143

Source: CCN
Type: WordPress multi-user (MU) Web site
WordPress MU > Home

Source: CCN
Type: SA26771
Wordpress Script Insertion and SQL Injection Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
26771

Source: SECUNIA
Type: Vendor Advisory
26796

Source: CONFIRM
Type: UNKNOWN
http://trac.wordpress.org/ticket/4770

Source: CCN
Type: WordPress Web site
WordPress

Source: CONFIRM
Type: Patch
http://wordpress.org/development/2007/09/wordpress-223/

Source: CCN
Type: Buayacorp Web site
Remote SQL Injection in WordPress and WordPress MU

Source: MISC
Type: UNKNOWN
http://www.buayacorp.com/files/wordpress/wordpress-sql-injection-advisory.html

Source: CCN
Type: OSVDB ID: 37276
Wordpress pingback.extensions.getPingbacks Method post_type Parameter SQL Injection

Source: VUPEN
Type: UNKNOWN
ADV-2007-3132

Source: MISC
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=285831

Source: XF
Type: UNKNOWN
wordpress-wordpressmu-pingback-sql-injection(36578)

Source: XF
Type: UNKNOWN
wordpress-wordpressmu-pingback-sql-injection(36578)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:0.7:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:0.71:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:1.2:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0.3:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0.5:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0.6:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0.7:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.0.10_rc2:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.1.1:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.1.3:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.1.3_rc2:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.2:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.2.1:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.2_revision5003:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    wordpress wordpress 0.6.2
    wordpress wordpress 0.6.2.1
    wordpress wordpress 0.7
    wordpress wordpress 0.71
    wordpress wordpress 1.2
    wordpress wordpress 1.2.1
    wordpress wordpress 1.2.2
    wordpress wordpress 1.5
    wordpress wordpress 1.5.1
    wordpress wordpress 1.5.1.2
    wordpress wordpress 1.5.1.3
    wordpress wordpress 2.0
    wordpress wordpress 2.0.1
    wordpress wordpress 2.0.2
    wordpress wordpress 2.0.3
    wordpress wordpress 2.0.4
    wordpress wordpress 2.0.5
    wordpress wordpress 2.0.6
    wordpress wordpress 2.0.7
    wordpress wordpress 2.0.10_rc1
    wordpress wordpress 2.0.10_rc2
    wordpress wordpress 2.1.1
    wordpress wordpress 2.1.2
    wordpress wordpress 2.1.3
    wordpress wordpress 2.1.3_rc1
    wordpress wordpress 2.1.3_rc2
    wordpress wordpress 2.2
    wordpress wordpress 2.2.1
    wordpress wordpress 2.2.2
    wordpress wordpress 2.2_revision5002
    wordpress wordpress 2.2_revision5003