Direct static code injection vulnerability in WordPress 2.0.2 and earlier allows remote attackers to execute arbitrary commands by inserting a carriage return and PHP code when updating a profile, which is appended after a special comment sequence into files in (1) wp-content/cache/userlogins/ (2) wp-content/cache/users/ which are later included by cache.php, as demonstrated using the displayname argument.
References
Configurations
Information
Published : 2006-05-30 14:02
Updated : 2018-10-18 09:41
NVD link : CVE-2006-2667
Mitre link : CVE-2006-2667
JSON object : View
CWE
Products Affected
wordpress
- wordpress