Show plain JSON{"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2007-01-05T00:00:00", "descriptions": [{"lang": "en", "value": "WordPress before 2.0.6, when mbstring is enabled for PHP, decodes alternate character sets after escaping the SQL query, which allows remote attackers to bypass SQL injection protection schemes and execute arbitrary SQL commands via multibyte charsets, as demonstrated using UTF-7."}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre"}, "references": [{"name": "wordpress-mbstring-security-bypass(31297)", "tags": ["vdb-entry", "x_refsource_XF"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31297"}, {"name": "21907", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/21907"}, {"name": "23741", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/23741"}, {"name": "OpenPKG-SA-2007.005", "tags": ["vendor-advisory", "x_refsource_OPENPKG"], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.005.html"}, {"name": "GLSA-200701-10", "tags": ["vendor-advisory", "x_refsource_GENTOO"], "url": "http://security.gentoo.org/glsa/glsa-200701-10.xml"}, {"name": "31579", "tags": ["vdb-entry", "x_refsource_OSVDB"], "url": "http://osvdb.org/31579"}, {"tags": ["x_refsource_CONFIRM"], "url": "http://wordpress.org/development/2007/01/wordpress-206/"}, {"name": "23595", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/23595"}, {"name": "20070105 Advisory 02/2007: WordPress Trackback Charset Decoding SQL Injection Vulnerability", "tags": ["mailing-list", "x_refsource_BUGTRAQ"], "url": "http://www.securityfocus.com/archive/1/456049/100/0/threaded"}, {"name": "ADV-2007-0061", "tags": ["vdb-entry", "x_refsource_VUPEN"], "url": "http://www.vupen.com/english/advisories/2007/0061"}, {"tags": ["x_refsource_MISC"], "url": "http://www.hardened-php.net/advisory_022007.141.html"}, {"name": "2112", "tags": ["third-party-advisory", "x_refsource_SREASON"], "url": "http://securityreason.com/securityalert/2112"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-0107", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "n/a", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "n/a"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "WordPress before 2.0.6, when mbstring is enabled for PHP, decodes alternate character sets after escaping the SQL query, which allows remote attackers to bypass SQL injection protection schemes and execute arbitrary SQL commands via multibyte charsets, as demonstrated using UTF-7."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "references": {"reference_data": [{"name": "wordpress-mbstring-security-bypass(31297)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31297"}, {"name": "21907", "refsource": "BID", "url": "http://www.securityfocus.com/bid/21907"}, {"name": "23741", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23741"}, {"name": "OpenPKG-SA-2007.005", "refsource": "OPENPKG", "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.005.html"}, {"name": "GLSA-200701-10", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200701-10.xml"}, {"name": "31579", "refsource": "OSVDB", "url": "http://osvdb.org/31579"}, {"name": "http://wordpress.org/development/2007/01/wordpress-206/", "refsource": "CONFIRM", "url": "http://wordpress.org/development/2007/01/wordpress-206/"}, {"name": "23595", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/23595"}, {"name": "20070105 Advisory 02/2007: WordPress Trackback Charset Decoding SQL Injection Vulnerability", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/456049/100/0/threaded"}, {"name": "ADV-2007-0061", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0061"}, {"name": "http://www.hardened-php.net/advisory_022007.141.html", "refsource": "MISC", "url": "http://www.hardened-php.net/advisory_022007.141.html"}, {"name": "2112", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/2112"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-07T12:03:37.157Z"}, "title": "CVE Program Container", "references": [{"name": "wordpress-mbstring-security-bypass(31297)", "tags": ["vdb-entry", "x_refsource_XF", "x_transferred"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/31297"}, {"name": "21907", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/21907"}, {"name": "23741", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/23741"}, {"name": "OpenPKG-SA-2007.005", "tags": ["vendor-advisory", "x_refsource_OPENPKG", "x_transferred"], "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.005.html"}, {"name": "GLSA-200701-10", "tags": ["vendor-advisory", "x_refsource_GENTOO", "x_transferred"], "url": "http://security.gentoo.org/glsa/glsa-200701-10.xml"}, {"name": "31579", "tags": ["vdb-entry", "x_refsource_OSVDB", "x_transferred"], "url": "http://osvdb.org/31579"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "http://wordpress.org/development/2007/01/wordpress-206/"}, {"name": "23595", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/23595"}, {"name": "20070105 Advisory 02/2007: WordPress Trackback Charset Decoding SQL Injection Vulnerability", "tags": ["mailing-list", "x_refsource_BUGTRAQ", "x_transferred"], "url": "http://www.securityfocus.com/archive/1/456049/100/0/threaded"}, {"name": "ADV-2007-0061", "tags": ["vdb-entry", "x_refsource_VUPEN", "x_transferred"], "url": "http://www.vupen.com/english/advisories/2007/0061"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://www.hardened-php.net/advisory_022007.141.html"}, {"name": "2112", "tags": ["third-party-advisory", "x_refsource_SREASON", "x_transferred"], "url": "http://securityreason.com/securityalert/2112"}]}]}, "cveMetadata": {"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-0107", "datePublished": "2007-01-09T00:00:00", "dateReserved": "2007-01-08T00:00:00", "dateUpdated": "2024-08-07T12:03:37.157Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}