Vulnerability Description
WordPress 2.0.3 allows remote attackers to obtain the installation path via a direct request to various files, such as those in the (1) wp-admin, (2) wp-content, and (3) wp-includes directories, possibly due to uninitialized variables.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | 2.0.3 |
References
- http://secunia.com/advisories/20928Vendor Advisory
- http://secunia.com/advisories/21447
- http://security.gentoo.org/glsa/glsa-200608-19.xml
- http://securityreason.com/securityalert/1187
- http://www.securityfocus.com/archive/1/438942/100/0/threaded
- http://www.securityfocus.com/archive/1/439062/100/0/threaded
- http://www.securityfocus.com/bid/18779
- http://www.vupen.com/english/advisories/2006/2661
- http://secunia.com/advisories/20928Vendor Advisory
- http://secunia.com/advisories/21447
- http://security.gentoo.org/glsa/glsa-200608-19.xml
- http://securityreason.com/securityalert/1187
- http://www.securityfocus.com/archive/1/438942/100/0/threaded
- http://www.securityfocus.com/archive/1/439062/100/0/threaded
- http://www.securityfocus.com/bid/18779
FAQ
What is CVE-2006-3390?
CVE-2006-3390 is a vulnerability with a CVSS score of 5.0 (MEDIUM). WordPress 2.0.3 allows remote attackers to obtain the installation path via a direct request to various files, such as those in the (1) wp-admin, (2) wp-content, and (3) wp-includes directories, possi...
How severe is CVE-2006-3390?
CVE-2006-3390 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3390?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress.