WordPress Charset Decoding SQL Injection Vulnerability
BID:21907
Info
WordPress Charset Decoding SQL Injection Vulnerability
| Bugtraq ID: | 21907 |
| Class: | Input Validation Error |
| CVE: | |
| Remote: | Yes |
| Local: | No |
| Published: | Jan 06 2007 12:00AM |
| Updated: | Jan 16 2007 10:00PM |
| Credit: | Stefan Esser is credited with the discovery of this vulnerability. |
| Vulnerable: |
WordPress Wordpress (B2) 0.6.2 .1 WordPress Wordpress (B2) 0.6.2 WordPress WordPress 2.0.5 WordPress WordPress 2.0.4 WordPress WordPress 2.0.3 WordPress WordPress 2.0.2 WordPress WordPress 2.0.1 WordPress WordPress 2.0 WordPress WordPress 1.5.2 WordPress WordPress 1.5.1 .3 WordPress WordPress 1.5.1 .2 WordPress WordPress 1.5.1 WordPress WordPress 1.5 WordPress WordPress 1.2.2 WordPress WordPress 1.2.1 WordPress WordPress 1.2 WordPress WordPress 0.71 WordPress WordPress 0.7 OpenPKG OpenPKG Stable OpenPKG OpenPKG E1.0-Solid OpenPKG OpenPKG Current OpenPKG OpenPKG 2-Stable-20061018 Gentoo Linux |
| Not Vulnerable: |
WordPress WordPress 2.0.6 |
Discussion
WordPress Charset Decoding SQL Injection Vulnerability
WordPress is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
WordPress 2.0.5 and prior versions are vulnerable.
WordPress is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database implementation.
WordPress 2.0.5 and prior versions are vulnerable.
Exploit / POC
WordPress Charset Decoding SQL Injection Vulnerability
An attacker can exploit this issue via a web client.
The following proof-of-concept exploit is available:
An attacker can exploit this issue via a web client.
The following proof-of-concept exploit is available: