Directory Traversal Affecting wordpress package, versions <2.1.0-1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-WORDPRESS-363282
- published 10 Jan 2008
- disclosed 10 Jan 2008
Introduced: 10 Jan 2008
CVE-2008-0194 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
wordpress
to version 2.1.0-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream wordpress
package and not the wordpress
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
Directory traversal vulnerability in wp-db-backup.php in WordPress 2.0.3 and earlier allows remote attackers to read arbitrary files, delete arbitrary files, and cause a denial of service via a .. (dot dot) in the backup parameter in a wp-db-backup.php action to wp-admin/edit.php. NOTE: this might be the same as CVE-2006-5705.1.
References
- https://security-tracker.debian.org/tracker/CVE-2008-0194
- http://www.securityfocus.com/archive/1/485786/100/0/threaded
- http://www.debian.org/security/2008/dsa-1502
- http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html
- http://securityvulns.ru/Sdocument755.html
- http://websecurity.com.ua/1676/
- http://secunia.com/advisories/29014
- http://www.securityfocus.com/bid/27123
- http://securityreason.com/securityalert/3539