Show plain JSON{"containers": {"cna": {"affected": [{"product": "n/a", "vendor": "n/a", "versions": [{"status": "affected", "version": "n/a"}]}], "datePublic": "2007-03-02T00:00:00", "descriptions": [{"lang": "en", "value": "WordPress 2.1.1, as downloaded from some official distribution sites during February and March 2007, contains an externally introduced backdoor that allows remote attackers to execute arbitrary commands via (1) an eval injection vulnerability in the ix parameter to wp-includes/feed.php, and (2) an untrusted passthru call in the iz parameter to wp-includes/theme.php."}], "problemTypes": [{"descriptions": [{"description": "n/a", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2018-10-16T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre"}, "references": [{"name": "20070303 WordPress source code compromised to enable remote code execution", "tags": ["mailing-list", "x_refsource_BUGTRAQ"], "url": "http://www.securityfocus.com/archive/1/461794/100/0/threaded"}, {"name": "VU#214480", "tags": ["third-party-advisory", "x_refsource_CERT-VN"], "url": "http://www.kb.cert.org/vuls/id/214480"}, {"name": "wordpress-theme-command-execution(32807)", "tags": ["vdb-entry", "x_refsource_XF"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32807"}, {"name": "wordpress-feed-code-execution(32804)", "tags": ["vdb-entry", "x_refsource_XF"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32804"}, {"name": "22797", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/22797"}, {"name": "ADV-2007-0812", "tags": ["vdb-entry", "x_refsource_VUPEN"], "url": "http://www.vupen.com/english/advisories/2007/0812"}, {"tags": ["x_refsource_CONFIRM"], "url": "http://wordpress.org/development/2007/03/upgrade-212/"}, {"name": "VU#641456", "tags": ["third-party-advisory", "x_refsource_CERT-VN"], "url": "http://www.kb.cert.org/vuls/id/641456"}, {"tags": ["x_refsource_MISC"], "url": "http://ifsec.blogspot.com/2007/03/wordpress-code-compromised-to-enable.html"}, {"name": "24374", "tags": ["third-party-advisory", "x_refsource_SECUNIA"], "url": "http://secunia.com/advisories/24374"}], "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-1277", "STATE": "PUBLIC"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "n/a", "version": {"version_data": [{"version_value": "n/a"}]}}]}, "vendor_name": "n/a"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "WordPress 2.1.1, as downloaded from some official distribution sites during February and March 2007, contains an externally introduced backdoor that allows remote attackers to execute arbitrary commands via (1) an eval injection vulnerability in the ix parameter to wp-includes/feed.php, and (2) an untrusted passthru call in the iz parameter to wp-includes/theme.php."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "n/a"}]}]}, "references": {"reference_data": [{"name": "20070303 WordPress source code compromised to enable remote code execution", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/461794/100/0/threaded"}, {"name": "VU#214480", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/214480"}, {"name": "wordpress-theme-command-execution(32807)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32807"}, {"name": "wordpress-feed-code-execution(32804)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32804"}, {"name": "22797", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22797"}, {"name": "ADV-2007-0812", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0812"}, {"name": "http://wordpress.org/development/2007/03/upgrade-212/", "refsource": "CONFIRM", "url": "http://wordpress.org/development/2007/03/upgrade-212/"}, {"name": "VU#641456", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/641456"}, {"name": "http://ifsec.blogspot.com/2007/03/wordpress-code-compromised-to-enable.html", "refsource": "MISC", "url": "http://ifsec.blogspot.com/2007/03/wordpress-code-compromised-to-enable.html"}, {"name": "24374", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24374"}]}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-07T12:50:34.951Z"}, "title": "CVE Program Container", "references": [{"name": "20070303 WordPress source code compromised to enable remote code execution", "tags": ["mailing-list", "x_refsource_BUGTRAQ", "x_transferred"], "url": "http://www.securityfocus.com/archive/1/461794/100/0/threaded"}, {"name": "VU#214480", "tags": ["third-party-advisory", "x_refsource_CERT-VN", "x_transferred"], "url": "http://www.kb.cert.org/vuls/id/214480"}, {"name": "wordpress-theme-command-execution(32807)", "tags": ["vdb-entry", "x_refsource_XF", "x_transferred"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32807"}, {"name": "wordpress-feed-code-execution(32804)", "tags": ["vdb-entry", "x_refsource_XF", "x_transferred"], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32804"}, {"name": "22797", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/22797"}, {"name": "ADV-2007-0812", "tags": ["vdb-entry", "x_refsource_VUPEN", "x_transferred"], "url": "http://www.vupen.com/english/advisories/2007/0812"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "http://wordpress.org/development/2007/03/upgrade-212/"}, {"name": "VU#641456", "tags": ["third-party-advisory", "x_refsource_CERT-VN", "x_transferred"], "url": "http://www.kb.cert.org/vuls/id/641456"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://ifsec.blogspot.com/2007/03/wordpress-code-compromised-to-enable.html"}, {"name": "24374", "tags": ["third-party-advisory", "x_refsource_SECUNIA", "x_transferred"], "url": "http://secunia.com/advisories/24374"}]}]}, "cveMetadata": {"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-1277", "datePublished": "2007-03-05T20:00:00", "dateReserved": "2007-03-05T00:00:00", "dateUpdated": "2024-08-07T12:50:34.951Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}