Raphael Geissert
2008-Sep-27 00:17 UTC
[Secure-testing-team] Bug#500295: possible script injection via /etc/wordpress/wp-config.php
Package: wordpress Version: 2.5.1-7 Severity: important Tags: security The file as found in 2.5.1-7 takes the HTTP_HOST and uses it to find the config-<host>.php file to include. This routine is prone to attacks by a local user via a especially crafted Host header. Feel free to increase the severity. Cheers, -- Atomo64 - Raphael Please avoid sending me Word, PowerPoint or Excel attachments. See http://www.gnu.org/philosophy/no-word-attachments.html -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 197 bytes Desc: This is a digitally signed message part. Url : http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20080926/3ab8f493/attachment.pgp