CVE-2005-4463 Affecting wordpress package, versions <1.5.2-1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-WORDPRESS-363274
- published 21 Dec 2005
- disclosed 21 Dec 2005
Introduced: 21 Dec 2005
CVE-2005-4463 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
wordpress
to version 1.5.2-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream wordpress
package and not the wordpress
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
WordPress before 1.5.2 allows remote attackers to obtain sensitive information via a direct request to (1) wp-includes/vars.php, (2) wp-content/plugins/hello.php, (3) wp-admin/upgrade-functions.php, (4) wp-admin/edit-form.php, (5) wp-settings.php, and (6) wp-admin/edit-form-comment.php, which leaks the path in an error message related to undefined functions or failed includes. NOTE: the wp-admin/menu-header.php vector is already covered by CVE-2005-2110. NOTE: the vars.php, edit-form.php, wp-settings.php, and edit-form-comment.php vectors were also reported to affect WordPress 2.0.1.
References
- https://security-tracker.debian.org/tracker/CVE-2005-4463
- http://www.securityfocus.com/archive/1/419994/100/0/threaded
- http://www.securityfocus.com/archive/1/419999/100/0/threaded
- http://www.securityfocus.com/archive/1/426304/100/0/threaded
- http://echo.or.id/adv/adv24-theday-2005.txt
- http://NeoSecurityTeam.net/advisories/Advisory-17.txt
- http://securityreason.com/securityalert/286