Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-6013

Опубликовано: 19 нояб. 2007
Источник: debian

Описание

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wordpressfixed2.5.0-1package
wordpressno-dsaetchpackage

Примечания

  • if untrusted people are allowed to read the database they could still

  • crack the hash with more work, so maybe this is unimportant?

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 17 лет назад

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.

redhat
больше 17 лет назад

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.

CVSS3: 9.8
nvd
больше 17 лет назад

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.

CVSS3: 9.8
github
больше 3 лет назад

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.