CVE-2006-4208 Affecting wordpress package, versions <2.0.5-0.1
Threat Intelligence
EPSS
1.43% (87th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-WORDPRESS-363062
- published 17 Aug 2006
- disclosed 17 Aug 2006
Introduced: 17 Aug 2006
CVE-2006-4208 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
wordpress
to version 2.0.5-0.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream wordpress
package and not the wordpress
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
Directory traversal vulnerability in wp-db-backup.php in Skippy WP-DB-Backup plugin for WordPress 1.7 and earlier allows remote authenticated users with administrative privileges to read arbitrary files via a .. (dot dot) in the backup parameter to edit.php.
References
- https://security-tracker.debian.org/tracker/CVE-2006-4208
- http://www.securityfocus.com/archive/1/443181/100/0/threaded
- http://trac.wordpress.org/changeset/4095
- http://www.skippy.net/blog/category/wordpress/plugins/wp-db-backup/
- http://secunia.com/advisories/21486
- http://www.securityfocus.com/bid/19504
- http://securityreason.com/securityalert/1401
- http://www.vupen.com/english/advisories/2006/3280
- https://exchange.xforce.ibmcloud.com/vulnerabilities/28375
CVSS Scores
version 3.1