mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
107 lines
3.7 KiB
JSON
107 lines
3.7 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2007-1277",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "WordPress 2.1.1, as downloaded from some official distribution sites during February and March 2007, contains an externally introduced backdoor that allows remote attackers to execute arbitrary commands via (1) an eval injection vulnerability in the ix parameter to wp-includes/feed.php, and (2) an untrusted passthru call in the iz parameter to wp-includes/theme.php."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "20070303 WordPress source code compromised to enable remote code execution",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/461794/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "VU#214480",
|
|
"refsource": "CERT-VN",
|
|
"url": "http://www.kb.cert.org/vuls/id/214480"
|
|
},
|
|
{
|
|
"name": "wordpress-theme-command-execution(32807)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32807"
|
|
},
|
|
{
|
|
"name": "wordpress-feed-code-execution(32804)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32804"
|
|
},
|
|
{
|
|
"name": "22797",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/22797"
|
|
},
|
|
{
|
|
"name": "ADV-2007-0812",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2007/0812"
|
|
},
|
|
{
|
|
"name": "http://wordpress.org/development/2007/03/upgrade-212/",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://wordpress.org/development/2007/03/upgrade-212/"
|
|
},
|
|
{
|
|
"name": "VU#641456",
|
|
"refsource": "CERT-VN",
|
|
"url": "http://www.kb.cert.org/vuls/id/641456"
|
|
},
|
|
{
|
|
"name": "http://ifsec.blogspot.com/2007/03/wordpress-code-compromised-to-enable.html",
|
|
"refsource": "MISC",
|
|
"url": "http://ifsec.blogspot.com/2007/03/wordpress-code-compromised-to-enable.html"
|
|
},
|
|
{
|
|
"name": "24374",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/24374"
|
|
}
|
|
]
|
|
}
|
|
} |