WordPress wp-pass.php security bypass
|wordpress-wppass-security-bypass (35272)||Medium Risk|
WordPress could allow a remote attacker to bypass cross-domain security restrictions, caused by a redirection vulnerability in the wp-pass.php script. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability to bypass cross-domain security restrictions, perform cross-site scripting attacks, conduct phishing attacks, and possibly execute arbitrary code on the system.
Upgrade to the latest version of Wordpress (2.2.2 or later), available from the WordPress Web site. See References.
- BugTraq Mailing List, Thu Jul 05 2007 - 10:14:20 CDT: Redirection Vulnerability in wp-pass.php, WordPress 2.2.1.
- WordPress Web site: WordPress.
- CVE-2007-3639: WordPress before 2.2.2 allows remote attackers to redirect visitors to other websites and potentially obtain sensitive information via (1) the _wp_http_referer parameter to wp-pass.php, related to the wp_get_referer function in wp-includes/functions.php; and possibly other vectors related to (2) wp-includes/pluggable.php and (3) the wp_nonce_ays function in wp-includes/functions.php.
- DSA-1564: wordpress -- multiple vulnerabilities
- OSVDB ID: 40802: WordPress wp-pass.php _wp_http_referer Variable Arbitrary Site Redirect
- Debian Debian Linux 4.0
- WordPress WordPress 2.2.1
Jul 05, 2007
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this
* According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall IBM be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.