MEDIUM · 5.0

CVE-2008-0191

WordPress 2.2.x and 2.3.x allows remote attackers to obtain sensitive information via an invalid p parameter in an rss2 action to the default URI, which reveals the full path and the SQL database stru...

Vulnerability Description

WordPress 2.2.x and 2.3.x allows remote attackers to obtain sensitive information via an invalid p parameter in an rss2 action to the default URI, which reveals the full path and the SQL database structure.

CVSS Score

5.0

MEDIUM

AV:N/AC:L/Au:N/C:P/I:N/A:N
Confidentiality
PARTIAL
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
WordpressWordpress2.2

Related Weaknesses (CWE)

References

FAQ

What is CVE-2008-0191?

CVE-2008-0191 is a vulnerability with a CVSS score of 5.0 (MEDIUM). WordPress 2.2.x and 2.3.x allows remote attackers to obtain sensitive information via an invalid p parameter in an rss2 action to the default URI, which reveals the full path and the SQL database stru...

How severe is CVE-2008-0191?

CVE-2008-0191 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2008-0191?

Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress.