Vulnerability Description
WordPress 1.5.1.2 and earlier allows remote attackers to obtain sensitive information via (1) a direct request to menu-header.php or a "1" value in the feed parameter to (2) wp-atom.php, (3) wp-rss.php, or (4) wp-rss2.php, which reveal the path in an error message. NOTE: vector [1] was later reported to also affect WordPress 2.0.1.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | 1.0 |
References
- http://NeoSecurityTeam.net/advisories/Advisory-17.txt
- http://marc.info/?l=bugtraq&m=112006967221438&w=2
- http://secunia.com/advisories/15831PatchVendor Advisory
- http://www.gulftech.org/?node=research&article_id=00085-06282005Vendor Advisory
- http://www.securityfocus.com/archive/1/426304/100/0/threaded
- http://NeoSecurityTeam.net/advisories/Advisory-17.txt
- http://marc.info/?l=bugtraq&m=112006967221438&w=2
- http://secunia.com/advisories/15831PatchVendor Advisory
- http://www.gulftech.org/?node=research&article_id=00085-06282005Vendor Advisory
- http://www.securityfocus.com/archive/1/426304/100/0/threaded
FAQ
What is CVE-2005-2110?
CVE-2005-2110 is a vulnerability with a CVSS score of 5.0 (MEDIUM). WordPress 1.5.1.2 and earlier allows remote attackers to obtain sensitive information via (1) a direct request to menu-header.php or a "1" value in the feed parameter to (2) wp-atom.php, (3) wp-rss.ph...
How severe is CVE-2005-2110?
CVE-2005-2110 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2110?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress.