Common Vulnerabilities and Exposures assigned an identifier CVE-2011-3818 to the following vulnerability: WordPress 2.9.2 and 3.0.4 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by wp-admin/includes/user.php and certain other files. References: [1] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3818 [2] http://www.openwall.com/lists/oss-security/2011/06/27/6 [3] http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README [4] http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/wordpress_2.9.2
Created wordpress tracking bugs for this issue Affects: fedora-all [bug 741304] Affects: epel-all [bug 741305]
Take a look at https://admin.fedoraproject.org/updates/wordpress. We have in Fedora/EPEL these packages: wordpress-3.2.1-2.fc16 Fedora 16 (since 2011-07-30 20:57:52) wordpress-3.2.1-1.fc14 Fedora 14 (since 2011-07-13 00:55:30) wordpress-3.2.1-1.fc15 Fedora 15 (since 2011-07-13 00:55:01) wordpress-3.2.1-1.el6 Fedora EPEL 6 (since 2011-07-05 10:18:13) wordpress-3.1.4-1.el5 Fedora EPEL 5 (since 2011-06-29 19:58:15) Given that https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3818 mentions wordpress 2.9.2 and 3.0.4 as being affected, I don't think we have any vulnerable version in our packages.
(In reply to comment #2) > Take a look at https://admin.fedoraproject.org/updates/wordpress. We have in > Fedora/EPEL these packages: > > wordpress-3.2.1-2.fc16 Fedora 16 (since 2011-07-30 20:57:52) > wordpress-3.2.1-1.fc14 Fedora 14 (since 2011-07-13 00:55:30) > wordpress-3.2.1-1.fc15 Fedora 15 (since 2011-07-13 00:55:01) > wordpress-3.2.1-1.el6 Fedora EPEL 6 (since 2011-07-05 10:18:13) > wordpress-3.1.4-1.el5 Fedora EPEL 5 (since 2011-06-29 19:58:15) > > Given that https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3818 > mentions wordpress 2.9.2 and 3.0.4 as being affected, I don't think we have any > vulnerable version in our packages. Thanks, Matej. Closing this bug.