CVE-2007-0541
WordPress Core < 2.1 - Directory Traversal
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
WordPress allows remote attackers to determine the existence of arbitrary files, and possibly read portions of certain files, via pingback service calls with a source URI that corresponds to a local pathname, which triggers different fault codes for existing and non-existing files, and in certain configurations causes a brief file excerpt to be published as a blog comment.
WordPress permite a atacantes remotos determinar la existencia de archivos de su elección, y posiblemente leer porciones de determinados archivos, mediante llamadas al servicio pingback con un URI origen que corresponde a un nombre de ruta local, lo cual dispara diferentes códigos de error para archivos existentes e inexistentes, y en determinadas configuraciones provoca que un breve extracto del archivo sea publicado como un comentario del blog.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-01-24 CVE Published
- 2007-01-29 CVE Reserved
- 2024-06-23 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://securityreason.com/securityalert/2191 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/457996/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/458003/100/0/threaded | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|