Vulnerability Name:

CVE-2010-0682 (CCN-56255)

Assigned:2010-02-13
Published:2010-02-13
Updated:2011-01-19
Summary:WordPress 2.9 before 2.9.2 allows remote authenticated users to read trash posts from other authors via a direct request with a modified p parameter.
CVSS v3 Severity:3.5 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N)
3.3 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N)
3.3 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N/E:F/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2010-0682

Source: MISC
Type: UNKNOWN
http://hakre.wordpress.com/2010/02/16/the-short-memory-of-wordpress-org-security/

Source: FEDORA
Type: UNKNOWN
FEDORA-2010-19330

Source: FEDORA
Type: UNKNOWN
FEDORA-2010-19329

Source: CCN
Type: SA38592
WordPress Trashed Posts Security Bypass Vulnerability

Source: SECUNIA
Type: Vendor Advisory
38592

Source: SECUNIA
Type: UNKNOWN
42871

Source: MISC
Type: UNKNOWN
http://tmacuk.co.uk/?p=180

Source: CCN
Type: WordPress Web site
WordPress

Source: CONFIRM
Type: Patch, Vendor Advisory
http://wordpress.org/development/2010/02/wordpress-2-9-2/

Source: OSVDB
Type: UNKNOWN
62330

Source: CCN
Type: OSVDB ID: 62330
Wordpress Trashed Post Direct Request Access Restriction Bypass

Source: CCN
Type: BID-38233
WordPress 'wp-admin/admin.php' Module Configuration Security Bypass Vulnerability

Source: CCN
Type: BID-38368
WordPress Trashed Posts Information Disclosure Vulnerability

Source: CONFIRM
Type: UNKNOWN
https://core.trac.wordpress.org/ticket/11236

Source: XF
Type: UNKNOWN
wordpress-trash-security-bypass(56255)

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [02-13-2010]

Vulnerable Configuration:Configuration 1:
  • cpe:/a:wordpress:wordpress:2.9:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.9.1:-:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.9.1:beta1:*:*:*:*:*:*
  • OR cpe:/a:wordpress:wordpress:2.9.1:rc1:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:wordpress:wordpress:2.9:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    wordpress wordpress 2.9
    wordpress wordpress 2.9.1
    wordpress wordpress 2.9.1 beta1
    wordpress wordpress 2.9.1 rc1
    wordpress wordpress 2.9 -