Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2008-1930
HistoryApr 28, 2008 - 8:05 p.m.

CVE-2008-1930

2008-04-2820:05:00
Debian Security Bug Tracker
security-tracker.debian.org
12

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.012 Low

EPSS

Percentile

85.4%

The cookie authentication method in WordPress 2.5 relies on a hash of a concatenated string containing USERNAME and EXPIRY_TIME, which allows remote attackers to forge cookies by registering a username that results in the same concatenated string, as demonstrated by registering usernames beginning with โ€œadminโ€ to obtain administrator privileges, aka a โ€œcryptographic splicingโ€ issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-6013.

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.012 Low

EPSS

Percentile

85.4%