7.5
CVSSv2

CVE-2006-2667

Published: 30/05/2006 Updated: 18/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Direct static code injection vulnerability in WordPress 2.0.2 and previous versions allows remote malicious users to execute arbitrary commands by inserting a carriage return and PHP code when updating a profile, which is appended after a special comment sequence into files in (1) wp-content/cache/userlogins/ (2) wp-content/cache/users/ which are later included by cache.php, as demonstrated using the displayname argument.

Vulnerable Product Search on Vulmon Subscribe to Product

wordpress wordpress

Exploits

#!/usr/bin/php -q -d short_open_tag=on <? echo "--------------------------------------------------------------------\r\n"; echo "| WordPress <= 202 'cache' shell injection exploit |\r\n"; echo "| by rgod rgod@autisticiorg |\r\n"; echo "| site: retrogodaltervistaorg ...