Vulnerability Description
WordPress 2.7.1 places the username of a post's author in an HTML comment, which allows remote attackers to obtain sensitive information by reading the HTML source.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | 2.7.1 |
Related Weaknesses (CWE)
References
- http://corelabs.coresecurity.com/index.php?action=view&type=advisory&name=WordPr
- http://securitytracker.com/id?1022528
- http://www.osvdb.org/55716Patch
- http://www.securityfocus.com/archive/1/504795/100/0/threaded
- http://www.vupen.com/english/advisories/2009/1833PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/51733
- http://corelabs.coresecurity.com/index.php?action=view&type=advisory&name=WordPr
- http://securitytracker.com/id?1022528
- http://www.osvdb.org/55716Patch
- http://www.securityfocus.com/archive/1/504795/100/0/threaded
- http://www.vupen.com/english/advisories/2009/1833PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/51733
FAQ
What is CVE-2009-2431?
CVE-2009-2431 is a vulnerability with a CVSS score of 5.0 (MEDIUM). WordPress 2.7.1 places the username of a post's author in an HTML comment, which allows remote attackers to obtain sensitive information by reading the HTML source.
How severe is CVE-2009-2431?
CVE-2009-2431 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-2431?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress.