7.5
CVSSv2

CVE-2007-0233

Published: 13/01/2007 Updated: 19/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

wp-trackback.php in WordPress 2.0.6 and previous versions does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote malicious users to execute arbitrary SQL commands via the tb_id parameter. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in WordPress.

Vulnerable Product Search on Vulmon Subscribe to Product

wordpress wordpress 0.6.2

wordpress wordpress 0.7

wordpress wordpress 1.5.1.3

wordpress wordpress 1.5.2

wordpress wordpress 2.0.6

wordpress wordpress 0.6.2.1

wordpress wordpress 1.5.1

wordpress wordpress 1.5.1.2

wordpress wordpress 2.0.4

wordpress wordpress 2.0.5

wordpress wordpress 0.71

wordpress wordpress 1.2

wordpress wordpress 1.2.1

wordpress wordpress 2.0

wordpress wordpress 2.0.1

wordpress wordpress 1.2.2

wordpress wordpress 1.5

wordpress wordpress 2.0.2

wordpress wordpress 2.0.3

Exploits

<?php print_r(' --------------------------------------------------------------------------- Wordpress <= 206 wp-trackbackphp Zend_Hash_Del_Key_Or_Index / / sql injection admin hash disclosure exploit (needs register_globals=on, 4 <= PHP < 443,< 514) by rgod dork: "is proudly powered by WordPress" mail: retrog at alice dot it s ...