{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2005-4463", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "WordPress before 1.5.2 allows remote attackers to obtain sensitive information via a direct request to (1) wp-includes/vars.php, (2) wp-content/plugins/hello.php, (3) wp-admin/upgrade-functions.php, (4) wp-admin/edit-form.php, (5) wp-settings.php, and (6) wp-admin/edit-form-comment.php, which leaks the path in an error message related to undefined functions or failed includes. NOTE: the wp-admin/menu-header.php vector is already covered by CVE-2005-2110. NOTE: the vars.php, edit-form.php, wp-settings.php, and edit-form-comment.php vectors were also reported to affect WordPress 2.0.1." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20051220 [ECHO_ADV_24$2005] Full path disclosure on WordPress < 1.5.2", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/419999/100/0/threaded" }, { "name" : "20051221 [ECHO_ADV_24$2005] Full path disclosure on WordPress < 1.5.2", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/419994/100/0/threaded" }, { "name" : "http://echo.or.id/adv/adv24-theday-2005.txt", "refsource" : "MISC", "url" : "http://echo.or.id/adv/adv24-theday-2005.txt" }, { "name" : "20060227 WordPress 2.0.1 Multiple Vulnerabilities", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/426304/100/0/threaded" }, { "name" : "http://NeoSecurityTeam.net/advisories/Advisory-17.txt", "refsource" : "MISC", "url" : "http://NeoSecurityTeam.net/advisories/Advisory-17.txt" }, { "name" : "286", "refsource" : "SREASON", "url" : "http://securityreason.com/securityalert/286" } ] } }