WordPress 1.5.1.2 and earlier allows remote attackers to obtain sensitive information via (1) a direct request to menu-header.php or a "1" value in the feed parameter to (2) wp-atom.php, (3) wp-rss.php, or (4) wp-rss2.php, which reveal the path in an error message. NOTE: vector [1] was later reported to also affect WordPress 2.0.1.
Link | Tags |
---|---|
http://NeoSecurityTeam.net/advisories/Advisory-17.txt | |
http://www.securityfocus.com/archive/1/426304/100/0/threaded | mailing list |
http://secunia.com/advisories/15831 | patch vendor advisory third party advisory |
http://www.gulftech.org/?node=research&article_id=00085-06282005 | vendor advisory |
http://marc.info/?l=bugtraq&m=112006967221438&w=2 | mailing list |