WordPress 2.0.3 allows remote attackers to obtain the installation path via a direct request to various files, such as those in the (1) wp-admin, (2) wp-content, and (3) wp-includes directories, possibly due to uninitialized variables.
Link | Tags |
---|---|
http://securityreason.com/securityalert/1187 | third party advisory |
http://secunia.com/advisories/20928 | third party advisory vendor advisory |
http://secunia.com/advisories/21447 | third party advisory |
http://www.securityfocus.com/bid/18779 | vdb entry |
http://www.securityfocus.com/archive/1/439062/100/0/threaded | mailing list |
http://security.gentoo.org/glsa/glsa-200608-19.xml | vendor advisory |
http://www.vupen.com/english/advisories/2006/2661 | vdb entry |
http://www.securityfocus.com/archive/1/438942/100/0/threaded | mailing list |