Vulnerability: Multiple vulnerabilities in WordPress
Danger: Average
Patch: Yes
Number of vulnerabilities: 3
Vector of operation: Remote
Impact: Cross Site Scripting, Disclosure of sensitive data
Affected products: WordPress 3.x
Affected versions: WordPress version to 3.5.1.
Description:
The vulnerability allows a remote user to gain access to sensitive data on the system.
1. An unspecified error in the handling of uncertain input data. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.
2. An unspecified error in the handling of uncertain input data. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.
3. The vulnerability is caused due to insufficient input validation in the parameter “sourceUri” in XMLRPC API method “pingback.ping”. This can be exploited via a specially crafted request containing directory traversal attacks, view the contents of arbitrary files on the system.
Manufacturer URL: http://wordpress.org/
Solution: Install the latest version 3.5.1 from the manufacturer.
Links: