Vulnerabilities > CVE-2006-3390 - Unspecified vulnerability in Wordpress 2.0.3
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN wordpress
nessus
Summary
WordPress 2.0.3 allows remote attackers to obtain the installation path via a direct request to various files, such as those in the (1) wp-admin, (2) wp-content, and (3) wp-includes directories, possibly due to uninitialized variables.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200608-19.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200608-19 (WordPress: Privilege escalation) The WordPress developers have confirmed a vulnerability in capability checking for plugins. Impact : By exploiting a flaw, a user can circumvent WordPress access restrictions when using plugins. The actual impact depends on the configuration of WordPress and may range from trivial to critical, possibly even the execution of arbitrary PHP code. Workaround : There is no known workaround at this time. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22218 |
published | 2006-08-14 |
reporter | This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22218 |
title | GLSA-200608-19 : WordPress: Privilege escalation |
code |
|
References
- http://www.securityfocus.com/bid/18779
- http://secunia.com/advisories/20928
- http://security.gentoo.org/glsa/glsa-200608-19.xml
- http://secunia.com/advisories/21447
- http://securityreason.com/securityalert/1187
- http://www.vupen.com/english/advisories/2006/2661
- http://www.securityfocus.com/archive/1/439062/100/0/threaded
- http://www.securityfocus.com/archive/1/438942/100/0/threaded