CVE-2008-0191

NameCVE-2008-0191
DescriptionWordPress 2.2.x and 2.3.x allows remote attackers to obtain sensitive information via an invalid p parameter in an rss2 action to the default URI, which reveals the full path and the SQL database structure.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
wordpress (PTS)jessie, jessie (lts)4.1.35+dfsg-0+deb8u1vulnerable
stretch (security), stretch (lts), stretch4.7.23+dfsg-0+deb9u1vulnerable
buster (security), buster, buster (lts)5.0.21+dfsg1-0+deb10u1vulnerable
bullseye (security), bullseye5.7.11+dfsg1-0+deb11u1vulnerable
bookworm (security), bookworm6.1.6+dfsg1-0+deb12u1vulnerable
sid, trixie6.6.1+dfsg1-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
wordpresssource(unstable)(unfixed)unimportant

Notes

full path and DB structure already known on Debian
poked hendry

Search for package or bug name: Reporting problems