CyberInsecure.com

Daily cyber threats and internet security news: network security, online safety and latest security alerts
April 10th, 2008

WordPress Multiple SQL Injection Vulnerabilities

WordPress is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query, particularly in wp-comments-post.php.

Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Attackers can use a browser to exploit these issues.

Currently there are no vendor-supplied patches. If you aware of more recent information, please comment.

WordPress 2.5 is vulnerable.
Other vulnerable versions:

WordPress 2.3.1
WordPress 2.2.3
WordPress 2.2.2
WordPress 2.2.1
WordPress 2.2.1
WordPress 2.1.3
WordPress 2.1.3
WordPress 2.1.2
WordPress 2.1.1
WordPress 2.0.10
WordPress 2.0.7
WordPress 2.0.6
WordPress 2.0.5
WordPress 2.0.4
WordPress 2.0.3
WordPress 2.0.2
WordPress 2.0.1
WordPress 2.0
WordPress 2.5
WordPress 2.3
WordPress 2.2 Revision 5003
WordPress 2.2 Revision 5002
WordPress 2.2
WordPress 2.1.3-RC2
WordPress 2.1.3-RC1
WordPress 2.1
WordPress 2.0.10-RC2
WordPress 2.0.10-RC1

(Credit: SecurityFocus.com)

Share this item with others:

More on CyberInsecure:
  • New Lateral SQL Injection Method To Hack Oracle Database
  • WordPress 2.6.2 Released Due To PHP Weakness That Might Lead To Attack
  • WordPress 2.8.3 Remote Admin Password Reset Vulnerability
  • WordPress Cookie Integrity Protection Allows Unauthorized Access
  • MySQL.com Database Compromised Through SQL Injection, Localized Website Versions Also Affected

  • If you found this information useful, consider linking to it from your own website.
    Just copy and paste the code below into your website (Ctrl+C to copy)
    It will look like this: WordPress Multiple SQL Injection Vulnerabilities

    5 Responses to “WordPress Multiple SQL Injection Vulnerabilities”

    1. Have you any details? Isn’t it only buzz rumors ?


    2. CyberInsecure Says:
      April 11th, 2008 at 10:25 am

      A very reputable security website has posted this vulnerability.
      Waiting for additional news, POC’s or comments.


    3. peter sysko Says:
      June 11th, 2008 at 7:43 pm

      pleast visit http://www.php.net/manual/en/function.mysql-real-escape-string.php
      to view best practice to prevent sql injections in php/mysql.. if wordpress does not use mysql_real_escape_string correctly or at all, this could be a serious issue for hundreds of thousands of wordpress installations! i’m staing notified to see if anyone else comments here.


    4. CyberInsecure Says:
      June 12th, 2008 at 4:43 am

      The issue was fixed in WP 2.5.1.


    5. Drake Silver Says:
      July 8th, 2008 at 9:25 pm

      Does anyone have an example of this exploit? Or any other info on what it actually is?


    Leave a Reply

    Comments with unsolicited links to other resources will be marked as spam. DO NOT leave links in comments. Please leave your real email, it wont be published.

    *
    To prove you’re a person (not a spam script), type the security word shown in the picture. Click on the picture to hear an audio file of the word.