Vulnerabilities > CVE-2006-2667 - Remote PHP Code Injection vulnerability in WordPress Username
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Direct static code injection vulnerability in WordPress 2.0.2 and earlier allows remote attackers to execute arbitrary commands by inserting a carriage return and PHP code when updating a profile, which is appended after a special comment sequence into files in (1) wp-content/cache/userlogins/ (2) wp-content/cache/users/ which are later included by cache.php, as demonstrated using the displayname argument.
Vulnerable Configurations
Exploit-Db
description | WordPress. CVE-2006-2667. Webapps exploit for php platform |
id | EDB-ID:6 |
last seen | 2016-01-31 |
modified | 2006-05-25 |
published | 2006-05-25 |
reporter | rgod |
source | https://www.exploit-db.com/download/6/ |
title | WordPress <= 2.0.2 - cache Remote Shell Injection Exploit |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200606-08.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200606-08 (WordPress: Arbitrary command execution) rgod discovered that WordPress insufficiently checks the format of cached username data. Impact : An attacker could exploit this vulnerability to execute arbitrary commands by sending a specially crafted username. As of Wordpress 2.0.2 the user data cache is disabled by default. Workaround : There are no known workarounds at this time. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21681 |
published | 2006-06-11 |
reporter | This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/21681 |
title | GLSA-200606-08 : WordPress: Arbitrary command execution |
code |
|
References
- http://retrogod.altervista.org/wordpress_202_xpl.html
- http://secunia.com/advisories/20271
- http://secunia.com/advisories/20608
- http://www.gentoo.org/security/en/glsa/glsa-200606-08.xml
- http://www.osvdb.org/25777
- http://www.securityfocus.com/archive/1/435039/100/0/threaded
- http://www.securityfocus.com/bid/18372
- http://www.vupen.com/english/advisories/2006/1992
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26687