Information Exposure Affecting wordpress package, versions *
Threat Intelligence
EPSS
0.58% (79th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-WORDPRESS-362925
- published 10 Jan 2008
- disclosed 10 Jan 2008
Introduced: 10 Jan 2008
CVE-2008-0191 Open this link in a new tabHow to fix?
There is no fixed version for Debian:unstable
wordpress
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream wordpress
package and not the wordpress
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
WordPress 2.2.x and 2.3.x allows remote attackers to obtain sensitive information via an invalid p parameter in an rss2 action to the default URI, which reveals the full path and the SQL database structure.
References
- https://security-tracker.debian.org/tracker/CVE-2008-0191
- http://www.securityfocus.com/archive/1/485786/100/0/threaded
- http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html
- http://securityvulns.ru/Sdocument663.html
- http://websecurity.com.ua/1634/
- http://securityreason.com/securityalert/3539
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39423
CVSS Scores
version 3.1