[wp-hackers] 1.5.2 SQL Injection

steve caturan scaturan at negimaki.com
Mon Mar 6 16:01:17 GMT 2006


actually Ryan had a discussion with Mr. Karlsson but either way, time to 
get crunching at least for me. got a few 1.5.2 installs to upgrade to 
2.0.1 :)


Podz wrote:
> http://www.gentoo.org/security/en/glsa/glsa-200603-01.xml
> 
> Description
> 
> Patrik Karlsson reported that WordPress 1.5.2 makes use of an
> insufficiently filtered User Agent string in SQL queries related to
> comments posting. This vulnerability was already fixed in the 2.0-series
> of WordPress.
> 
> Impact
> 
> An attacker could send a comment with a malicious User Agent parameter,
> resulting in SQL injection and potentially in the subversion of the
> WordPress database. This vulnerability wouldn't affect WordPress sites
> which do not allow comments or which require that comments go through a
> moderator.
> 
> Reported in the forums:
> http://wordpress.org/support/topic/63734?replies=3#post-339189
> 
> There are a lot of people still using 1.5.2
> Can this be patched so an upgrade does not have to be the response ?
> 
> An announcement is also called for surely ?
> 
> P.
> _______________________________________________
> wp-hackers mailing list
> wp-hackers at lists.automattic.com
> http://lists.automattic.com/mailman/listinfo/wp-hackers
> 
> 
> 




More information about the wp-hackers mailing list