Vulnerability Description
wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier generates different error messages for requests lacking a dbname parameter depending on whether the MySQL credentials are valid, which makes it easier for remote attackers to conduct brute-force attacks via a series of requests with different uname and pwd parameters. NOTE: the vendor disputes the significance of this issue; also, it is unclear whether providing intentionally vague error messages during installation would be reasonable from a usability perspective
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | <= 3.3.1 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/bugtraq/2012-01/0150.htmlExploit
- http://www.exploit-db.com/exploits/18417Exploit
- https://www.trustwave.com/spiderlabs/advisories/TWSL2012-002.txtExploit
- http://archives.neohapsis.com/archives/bugtraq/2012-01/0150.htmlExploit
- http://www.exploit-db.com/exploits/18417Exploit
- https://www.trustwave.com/spiderlabs/advisories/TWSL2012-002.txtExploit
FAQ
What is CVE-2011-4898?
CVE-2011-4898 is a vulnerability with a CVSS score of 5.0 (MEDIUM). wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier generates different error messages for requests lacking a dbname parameter depending on whether the MySQL credent...
How severe is CVE-2011-4898?
CVE-2011-4898 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-4898?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress.