The XML-RPC implementation (xmlrpc.php) in WordPress before 2.3.3, when registration is enabled, allows remote attackers to edit posts of other blog users via unknown vectors.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.securitytracker.com/id?1019316 | vdb entry |
http://wordpress.org/development/2008/02/wordpress-233/ | patch |
http://secunia.com/advisories/28823 | third party advisory vendor advisory |
http://secunia.com/advisories/28920 | third party advisory |
http://www.vupen.com/english/advisories/2008/0448 | vdb entry |
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00416.html | vendor advisory |
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00349.html | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=431547 | |
http://secunia.com/advisories/30960 | third party advisory |
http://www.debian.org/security/2008/dsa-1601 | vendor advisory |
http://www.village-idiot.org/archives/2008/02/02/wordpress-232-exploit-confirmed/ | |
http://www.securityfocus.com/bid/27669 | vdb entry patch |