CVE-2008-4769

CVSS V2 High 9.3 CVSS V3 None
Description
Directory traversal vulnerability in the get_category_template function in wp-includes/theme.php in WordPress 2.3.3 and earlier, and 2.5, allows remote attackers to include and possibly execute arbitrary PHP files via the cat parameter in index.php. NOTE: some of these details are obtained from third party information.
Overview
  • CVE ID
  • CVE-2008-4769
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2008-10-28T10:30:01
  • Last Modified Date
  • 2017-08-08T01:32:54
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* 1 OR 2.3.3
cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:0.71-gold:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:0.72:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:0.72:beta1:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:0.72:beta2:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:0.72:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.0-platinum:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.0.1-miles:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.0.2-blakey:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.2:beta:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.2-delta:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.2-mingus:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:1.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.0.10_rc2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.1:alpha_3:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.1.3_rc2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.2.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.2_revision5003:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.3.1:rc1:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 9.3
  • Severity
  • HIGH
  • Exploitability Score
  • 8.6
  • Impact Score
  • 10
History
Created Old Value New Value Data Type Notes
2022-05-10 09:05:34 Added to TrackCVE