Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-6013

Опубликовано: 19 нояб. 2007
Источник: debian
EPSS Низкий

Описание

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wordpressfixed2.5.0-1package
wordpressno-dsaetchpackage

Примечания

  • if untrusted people are allowed to read the database they could still

  • crack the hash with more work, so maybe this is unimportant?

EPSS

Процентиль: 81%
0.01551
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 18 лет назад

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.

redhat
около 18 лет назад

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.

CVSS3: 9.8
nvd
около 18 лет назад

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.

CVSS3: 9.8
github
почти 4 года назад

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.

EPSS

Процентиль: 81%
0.01551
Низкий