Vulnerability Details : CVE-2013-0235
The XMLRPC API in WordPress before 3.5.1 allows remote attackers to send HTTP requests to intranet servers, and conduct port-scanning attacks, by specifying a crafted source URL for a pingback, related to a Server-Side Request Forgery (SSRF) issue.
Vulnerability category: Server-side request forgery (SSRF)
At least one public exploit which can be used to exploit this vulnerability exists!
Threat overview for CVE-2013-0235
Top countries where our scanners detected CVE-2013-0235
Top open port discovered on systems with this issue
80
IPs affected by CVE-2013-0235 34
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2013-0235!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2013-0235
Probability of exploitation activity in the next 30 days: 3.51%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 90 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2013-0235
-
Wordpress Pingback Locator
First seen: 2020-04-26auxiliary/scanner/http/wordpress_pingback_accessThis module will scan for wordpress sites with the Pingback API enabled. By interfacing with the API an attacker can cause the wordpress site to port scan an external target and return results. Refer to the wordpress_pingback_portscanner module. Thi
CVSS scores for CVE-2013-0235
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Source |
---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:P/A:N |
10.0
|
4.9
|
nvd@nist.gov |
References for CVE-2013-0235
-
http://core.trac.wordpress.org/changeset/23330
Changeset 23330 – WordPress TracExploit;Patch
-
http://www.acunetix.com/blog/web-security-zone/wordpress-pingback-vulnerability/
WordPress Pingback Vulnerability Found in WordPress 3.5
-
https://bugzilla.redhat.com/show_bug.cgi?id=904120
904120 – (CVE-2013-0235) CVE-2013-0235 wordpress: Server-side request forgery and remote port scanning using pingbacks
-
http://codex.wordpress.org/Version_3.5.1
Version 3.5.1 | WordPress.org
-
http://wordpress.org/news/2013/01/wordpress-3-5-1/
News – WordPress 3.5.1 Maintenance and Security Release – WordPress.org
Products affected by CVE-2013-0235
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*