Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

WordPress Pingback Information Disclosure Vulnerability Vulnerability Scan


Vulnerability Scan Summary
Tries to access a local file via WordPress' Pingback

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a PHP application that is affected by
an information disclosure vulnerability.

Description :

The version of WordPress installed on the remote host fails to
sanitize the 'sourceURI' before passing it to the 'wp_remote_fopen()'
function when processing pingbacks. An unauthenticated remote
attacker can leverage this issue to, say, acertain the existence of
local files and possibly even to view parts of those files, subject to
the permissions of the web server user id.

In addition, the version is also reportedly susceptible to a denial of
service attack because it allows an anonymous attacker to cause a
server to fetch arbitrary URLs without limits.

See also :

http://www.securityfocus.com/archive/1/458003/30/0/threaded
http://comox.textdrive.com/pipermail/wp-svn/2007-January/002387.html

Solution :

Upgrade to WordPress version 2.1 or later.

Threat Level:

Low / CVSS Base Score : 2.3
(AV:R/AC:L/Au:NR/C:P/I:N/A:N/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.