WordPress 敏感信息泄露漏洞

漏洞信息详情

WordPress 敏感信息泄露漏洞

漏洞简介

WordPress 2.0.2至2.0.5可让远程攻击者通过直接访问以下文件从而在各种错误消息中揭示路径来获取敏感信息:(1) 404.php, (2) akismet.php, (3) archive.php, (4) archives.php, (5) attachment.php, (6) blogger.php, (7) comments.php, (8) comments-popup.php, (9) dotclear.php, (10) footer.php, (11) functions.php, (12) header.php, (13) hello.php, (14) wp-content/themes/default/index.php, (15) links.php, (16) livejournal.php, (17) mt.php, (18) page.php, (19) rss.php, (20) searchform.php, (21) search.php, (22) sidebar.php, (23) single.php, (24) textpattern.php, (25) upgrade-functions.php, (26) upgrade-schema.php或(27) wp-db-backup.php。

漏洞公告

参考网址

来源: BUGTRAQ

名称: 20060911 Re: Re: Sql Injection and Path Disclosoure WordPress v2.0.5

链接:http://www.securityfocus.com/archive/1/archive/1/445711/100/0/threaded

来源: BUGTRAQ

名称: 20060907 Re: Re: Sql Injection and Path Disclosoure WordPress v2.0.5

链接:http://www.securityfocus.com/archive/1/archive/1/445604/100/0/threaded

来源: BUGTRAQ

名称: 20060907 Re: Sql Injection and Path Disclosoure WordPress v2.0.5

链接:http://www.securityfocus.com/archive/1/archive/1/445471/100/0/threaded

来源: BUGTRAQ

名称: 20060906 Sql Injection and Path Disclosoure WordPress v2.0.5

链接:http://www.securityfocus.com/archive/1/archive/1/445374/100/0/threaded

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享