Description
|
|
Multiple vulnerabilities were identified in WordPress, which could be exploited by malicious users to conduct SQL injection and cross site scripting attacks.
The first issue is due to an input validation error in the "post.php" script when processing specially crafted "comment" or "p" parameters, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The second vulnerability is due to an input validation error in the XMLRPC module when processing a specially crafted "HTTP_RAW_POST_DATA" variable, which may be exploited by remote users to conduct SQL injection attacks.
The third flaw is due to an input validation error in the "wp-login.php" file when processing a specially crafted "message" variable, which may be exploited by remote users to manipulate the "Forgotten Password" option.
The fourth vulnerability resides in the "menu-header.php", "wp-atom.php", "wp-rss.php", and "wp-rss2.php" files, which could be exploited by attackers to determine the installation path.
The fifth issue is due to an input validation in the "comments" posting feature that does not properly validate the "HTTP_USER_AGENT" header, which could be exploited by malicious people to conduct SQL injection attacks.
|