WordPress 2.7.1 places the username of a post's author in an HTML comment, which allows remote attackers to obtain sensitive information by reading the HTML source.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.osvdb.org/55716 | vdb entry patch |
http://corelabs.coresecurity.com/index.php?action=view&type=advisory&name=WordPress_Privileges_Unchecked | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/51733 | vdb entry |
http://www.securityfocus.com/archive/1/504795/100/0/threaded | mailing list |
http://securitytracker.com/id?1022528 | vdb entry |
http://www.vupen.com/english/advisories/2009/1833 | vdb entry patch vendor advisory |