Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-6013

Опубликовано: 19 нояб. 2007
Источник: redhat
EPSS Низкий

Описание

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=392411wordpress cookie authentication vulnerability

EPSS

Процентиль: 80%
0.01393
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 17 лет назад

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.

CVSS3: 9.8
nvd
больше 17 лет назад

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.

CVSS3: 9.8
debian
больше 17 лет назад

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash o ...

CVSS3: 9.8
github
больше 3 лет назад

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.

EPSS

Процентиль: 80%
0.01393
Низкий