{"vuid":"VU#214480","idnumber":"214480","name":"WordPress fails to properly sanitize input passed to the ix parameter in wp-includes/feed.php","keywords":["WordPress","arbitrary code execution","ix","wp-includes/feed.php","eval"],"overview":"WordPress fails to properly sanitize input to the ix parameter in wp-includes/feed.php, which could allow a remote, unauthenticated attacker to execute arbitrary PHP code.","clean_desc":"WordPress is a blogging application that is written in PHP. WordPress 2.1.1 fails to properly sanitize input to the ix parameter in wp-includes/feed.php,  PHP commands that are passed to the ix parameter are executed by the WordPress server.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary PHP code on a vulnerable WordPress system.","resolution":"Apply an update\nThis issue is addressed in WordPress 2.1.2.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by Ivan Fratric.","author":"This document was written by Will Dormann.","public":["http://ifsec.blogspot.com/2007/03/wordpress-code-compromised-to-enable.html","http://wordpress.org/development/2007/03/upgrade-212/","http://secunia.com/advisories/24374/","http://www.securityfocus.com/bid/22797"],"cveids":["CVE-2007-1277"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2007-03-05T13:40:41Z","publicdate":"2007-03-02T00:00:00Z","datefirstpublished":"2007-03-05T18:06:16Z","dateupdated":"2007-03-07T16:01:31Z","revision":14,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"3","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"12","cam_population":"6","cam_impact":"14","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"20.16","cam_scorecurrentwidelyknown":"20.16","cam_scorecurrentwidelyknownexploited":"32.76","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":20.16,"vulnote":null}