Vulnerability Description
WordPress 2.2.x and 2.3.x allows remote attackers to obtain sensitive information via an invalid p parameter in an rss2 action to the default URI, which reveals the full path and the SQL database structure.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | 2.2 |
Related Weaknesses (CWE)
References
- http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html
- http://securityreason.com/securityalert/3539
- http://securityvulns.ru/Sdocument663.html
- http://websecurity.com.ua/1634/
- http://www.securityfocus.com/archive/1/485786/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39423
- http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059439.html
- http://securityreason.com/securityalert/3539
- http://securityvulns.ru/Sdocument663.html
- http://websecurity.com.ua/1634/
- http://www.securityfocus.com/archive/1/485786/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39423
FAQ
What is CVE-2008-0191?
CVE-2008-0191 is a vulnerability with a CVSS score of 5.0 (MEDIUM). WordPress 2.2.x and 2.3.x allows remote attackers to obtain sensitive information via an invalid p parameter in an rss2 action to the default URI, which reveals the full path and the SQL database stru...
How severe is CVE-2008-0191?
CVE-2008-0191 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-0191?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress.