2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2007-4894" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2007-09-14T18:17:00.000" ,
2024-11-22 07:15:30 +00:00
"lastModified" : "2024-11-21T00:36:39.550" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Multiple SQL injection vulnerabilities in Wordpress before 2.2.3 and Wordpress multi-user (MU) before 1.2.5a allow remote attackers to execute arbitrary SQL commands via the post_type parameter to the pingback.extensions.getPingbacks method in the XMLRPC interface, and other unspecified parameters related to \"early database escaping\" and missing validation of \"query string like parameters.\""
} ,
{
"lang" : "es" ,
"value" : "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en Wordpress versiones anteriores a 2.2.3 y Wordpress multi-user (MU) versiones anteriores a 1.2.5a permiten a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n mediante el par\u00e1metro post_type en el m\u00e9todo pingback.extensions.getPingbacks en el interfaz XMLRPC, y otros par\u00e1metros no especificados relativos a \"escapado temprano de base de datos\" y omisi\u00f3n de validaci\u00f3n de \"cadena de consulta como par\u00e1metros\"."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
2024-11-22 07:15:30 +00:00
"baseScore" : 7.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-22 07:15:30 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-89"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4FEB898B-BF80-44C1-A847-AC0062458B58"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7E70EF48-AD6C-4119-B7C4-67E889A2BB27"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0395AD1D-3470-49EE-9F2A-349EF8782B40"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9C8B90E9-5DF5-45F5-9810-2973FDAA16A3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FF1FE320-DF71-42EC-A0F0-300F7D6D4AB4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B64D4777-2ED6-4A47-A8F3-38A3A8EB1ACB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "614956CB-0582-4EAD-86F4-5AB0BB781CE0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "503E4894-3F39-471F-9A56-052718813BF9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "38085E5A-7B41-4E43-8A22-5FD44970F3EA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7F0BF1F6-A54A-48E8-A872-015FE10E5D03"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4F0B6EAC-E43D-4D1B-856F-7C23250A2355"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BDCFE9AA-39E9-4366-AAB7-F7A891BC797E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BAF4671A-8449-438E-922B-94E5542137BC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "92F05A1F-2227-4166-807B-1BDE2EA8F245"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0CF73E23-7CD0-429C-986B-5F721F1696BC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EECE66B3-3696-4E98-AF63-DF2FB256A6FB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E75BB382-6B47-4C6A-BF94-80443BEB1A23"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EFA75368-506F-4772-B0F2-8AAECDF288F2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FDDD9E5C-766F-4945-B87D-781E780AB03E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "77D85664-E355-4A68-89EB-D5C9D0E6B916"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.0.10_rc2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "91243043-F4A6-40EF-97FC-989ED366394C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7A7CBC45-320E-48CF-9A63-07DDE2FB61BE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "266E32CD-66FB-4E19-8091-EC748B177D8A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D3DD9120-2224-4612-A6EE-539F47BD50E0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "14B0A9E4-9D09-4127-AF8B-4DA6D488E67C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.1.3_rc2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E8C667FD-BA00-43B3-8313-5A24A2DFF55A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5A9FBA02-8A6A-471F-92CD-D8E77B5061C2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1B5BC7E8-4C8A-4183-AB8C-1DAE12935387"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A0F9137B-D13F-488B-8196-85E06FAB682E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8AC4F089-A606-4880-8C5D-24520B55CD14"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:wordpress:wordpress:2.2_revision5003:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B4F6724F-AC94-4D6B-BEB7-EF4683FD1A07"
}
]
}
]
}
] ,
"references" : [
2024-04-04 08:46:00 +00:00
{
"url" : "http://fedoranews.org/updates/FEDORA-2007-214.shtml" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://secunia.com/advisories/26771" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/26796" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://trac.wordpress.org/ticket/4770" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://wordpress.org/development/2007/09/wordpress-223/" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.buayacorp.com/files/wordpress/wordpress-sql-injection-advisory.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2007/3132" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=285831" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36578" ,
"source" : "cve@mitre.org"
2024-11-22 07:15:30 +00:00
} ,
{
"url" : "http://fedoranews.org/updates/FEDORA-2007-214.shtml" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://secunia.com/advisories/26771" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://secunia.com/advisories/26796" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
} ,
{
"url" : "http://trac.wordpress.org/ticket/4770" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://wordpress.org/development/2007/09/wordpress-223/" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.buayacorp.com/files/wordpress/wordpress-sql-injection-advisory.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.vupen.com/english/advisories/2007/3132" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://bugzilla.redhat.com/show_bug.cgi?id=285831" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/36578" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}