Vulnerability Name: | CVE-2010-0682 (CCN-56255) | ||||||||
Assigned: | 2010-02-13 | ||||||||
Published: | 2010-02-13 | ||||||||
Updated: | 2011-01-19 | ||||||||
Summary: | WordPress 2.9 before 2.9.2 allows remote authenticated users to read trash posts from other authors via a direct request with a modified p parameter. | ||||||||
CVSS v3 Severity: | 3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)
| ||||||||
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N) 3.3 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N/E:F/RL:OF/RC:C)
3.3 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:F/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-264 | ||||||||
Vulnerability Consequences: | Bypass Security | ||||||||
References: | Source: MITRE Type: CNA CVE-2010-0682 Source: MISC Type: UNKNOWN http://hakre.wordpress.com/2010/02/16/the-short-memory-of-wordpress-org-security/ Source: FEDORA Type: UNKNOWN FEDORA-2010-19330 Source: FEDORA Type: UNKNOWN FEDORA-2010-19329 Source: CCN Type: SA38592 WordPress Trashed Posts Security Bypass Vulnerability Source: SECUNIA Type: Vendor Advisory 38592 Source: SECUNIA Type: UNKNOWN 42871 Source: MISC Type: UNKNOWN http://tmacuk.co.uk/?p=180 Source: CCN Type: WordPress Web site WordPress Source: CONFIRM Type: Patch, Vendor Advisory http://wordpress.org/development/2010/02/wordpress-2-9-2/ Source: OSVDB Type: UNKNOWN 62330 Source: CCN Type: OSVDB ID: 62330 Wordpress Trashed Post Direct Request Access Restriction Bypass Source: CCN Type: BID-38233 WordPress 'wp-admin/admin.php' Module Configuration Security Bypass Vulnerability Source: CCN Type: BID-38368 WordPress Trashed Posts Information Disclosure Vulnerability Source: CONFIRM Type: UNKNOWN https://core.trac.wordpress.org/ticket/11236 Source: XF Type: UNKNOWN wordpress-trash-security-bypass(56255) Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [02-13-2010] | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |