WordPress 2.1.1, as downloaded from some official distribution sites during February and March 2007, contains an externally introduced backdoor that allows remote attackers to execute arbitrary commands via (1) an eval injection vulnerability in the ix parameter to wp-includes/feed.php, and (2) an untrusted passthru call in the iz parameter to wp-includes/theme.php.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/461794/100/0/threaded | mailing list |
http://www.kb.cert.org/vuls/id/214480 | third party advisory us government resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32807 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/32804 | vdb entry |
http://www.securityfocus.com/bid/22797 | vdb entry |
http://www.vupen.com/english/advisories/2007/0812 | vdb entry |
http://wordpress.org/development/2007/03/upgrade-212/ | vendor advisory |
http://www.kb.cert.org/vuls/id/641456 | third party advisory us government resource |
http://ifsec.blogspot.com/2007/03/wordpress-code-compromised-to-enable.html | exploit |
http://secunia.com/advisories/24374 | third party advisory vendor advisory |