CVE-2007-0233
Publication date 13 January 2007
Last updated 24 July 2024
Ubuntu priority
wp-trackback.php in WordPress 2.0.6 and earlier does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter’s hash value, which allows remote attackers to execute arbitrary SQL commands via the tb_id parameter. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in WordPress.
Status
Package | Ubuntu Release | Status |
---|---|---|
wordpress | 9.10 karmic |
Fixed 2.1.0-1
|
9.04 jaunty |
Fixed 2.1.0-1
|
|
8.10 intrepid |
Fixed 2.1.0-1
|
|
8.04 LTS hardy |
Fixed 2.1.0-1
|
|
7.10 gutsy |
Fixed 2.1.0-1
|
|
7.04 feisty |
Fixed 2.1.0-1
|
|
6.10 edgy | Ignored end of life, was needed | |
6.06 LTS dapper | Ignored end of life |