SQL Injection Affecting wordpress package, versions <2.1.3-1
Threat Intelligence
EPSS
1.49% (87th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-WORDPRESS-363066
- published 9 Apr 2007
- disclosed 9 Apr 2007
How to fix?
Upgrade Debian:unstable
wordpress
to version 2.1.3-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream wordpress
package and not the wordpress
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
SQL injection vulnerability in xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users to execute arbitrary SQL commands via a string parameter value in an XML RPC mt.setPostCategories method call, related to the post_id variable.
References
- https://security-tracker.debian.org/tracker/CVE-2007-1897
- http://www.debian.org/security/2007/dsa-1285
- https://www.exploit-db.com/exploits/3656
- http://trac.wordpress.org/ticket/4091
- http://www.notsosecure.com/folder2/2007/04/03/wordpress-212-xmlrpc-security-issues/
- http://www.vupen.com/english/advisories/2007/1245
- http://secunia.com/advisories/24751
- http://secunia.com/advisories/25108
- http://www.securityfocus.com/bid/23294
CVSS Scores
version 3.1