Vulnerabilities > CVE-2006-2702 - Remote Security vulnerability in Wordpress 2.0.2
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
PARTIAL Availability impact
NONE Summary
vars.php in WordPress 2.0.2, possibly when running on Mac OS X, allows remote attackers to spoof their IP address via a PC_REMOTE_ADDR HTTP header, which vars.php uses to redefine $_SERVER['REMOTE_ADDR'].
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200606-08.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200606-08 (WordPress: Arbitrary command execution) rgod discovered that WordPress insufficiently checks the format of cached username data. Impact : An attacker could exploit this vulnerability to execute arbitrary commands by sending a specially crafted username. As of Wordpress 2.0.2 the user data cache is disabled by default. Workaround : There are no known workarounds at this time. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 21681 |
published | 2006-06-11 |
reporter | This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/21681 |
title | GLSA-200606-08 : WordPress: Arbitrary command execution |
code |
|
References
- http://retrogod.altervista.org/wordpress_202_xpl.html
- http://secunia.com/advisories/20271
- http://secunia.com/advisories/20608
- http://www.gentoo.org/security/en/glsa/glsa-200606-08.xml
- http://www.osvdb.org/25935
- http://www.securityfocus.com/archive/1/435039/100/0/threaded
- http://www.vupen.com/english/advisories/2006/1992
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26688