Vulnerability CVE-2006-3389


Published: 2006-07-06   Modified: 2012-02-12

Description:
index.php in WordPress 2.0.3 allows remote attackers to obtain sensitive information, such as SQL table prefixes, via an invalid paged parameter, which displays the information in an SQL error message. NOTE: this issue has been disputed by a third party who states that the issue does not leak any target-specific information.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
WordPress 2.0.3 SQL Error and Full Path Disclosure
xzerox linuxmail...
08.07.2006

Type:

CWE-Other

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
5/10
2.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Wordpress -> Wordpress 

 References:
http://security.gentoo.org/glsa/glsa-200608-19.xml
http://securityreason.com/securityalert/1187
http://www.securityfocus.com/archive/1/438942/100/0/threaded
http://www.securityfocus.com/archive/1/439031/100/0/threaded
http://www.securityfocus.com/archive/1/439062/100/0/threaded
http://www.securityfocus.com/archive/1/440127/100/0/threaded
http://www.securityfocus.com/bid/18779
http://www.vupen.com/english/advisories/2006/2661

Copyright 2020, cxsecurity.com

 

Back to Top