First published: Thu Jan 10 2008(Updated: )
Directory traversal vulnerability in wp-db-backup.php in WordPress 2.0.3 and earlier allows remote attackers to read arbitrary files, delete arbitrary files, and cause a denial of service via a .. (dot dot) in the backup parameter in a wp-db-backup.php action to wp-admin/edit.php. NOTE: this might be the same as CVE-2006-5705.1.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <=2.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0194 is considered a high severity vulnerability due to its potential impact on file integrity and availability.
To fix CVE-2008-0194, upgrade WordPress to version 2.0.4 or later where this vulnerability is patched.
CVE-2008-0194 allows attackers to read and delete arbitrary files, which could lead to a denial of service.
CVE-2008-0194 affects WordPress versions 2.0.3 and earlier.
Directory traversal in CVE-2008-0194 refers to the ability of an attacker to navigate the server's file directory structure and access unauthorized files.