Family: CGI abuses --> Category: attack
WordPress Trackback tb_id Parameter SQL Injection Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Tries to generate a SQL error
Detailed Explanation for this Vulnerability Test
The remote web server contains a PHP application that is prone to SQL
The version of WordPress on the remote host fails to properly sanitize
input to the 'tb_id' parameter of the 'wp-trackback.php' script before
using it in database queries. An unauthenticated remote attacker can
leverage this issue to launch SQL injection attacks against the
affected application, including discovery of password hashes of
Note that successful exploitation of this issue requires that PHP's
'register_globals' setting be enabled and that the remote version of
PHP be older than 4.4.3 or 5.1.4.
See also :
Unknown at this time.
High / CVSS Base Score : 7
Click HERE for more information and discussions on this network vulnerability scan.