CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:H/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
86.5%
WordPress before 2.6.2 does not properly handle MySQL warnings about insertion of username strings that exceed the maximum column width of the user_login column, and does not properly handle space characters when comparing usernames, which allows remote attackers to change an arbitrary user’s password to a random value by registering a similar username and then requesting a password reset, related to a “SQL column truncation vulnerability.” NOTE: the attacker can discover the random password by also exploiting CVE-2008-4107.
Vendor | Product | Version | CPE |
---|---|---|---|
wordpress | wordpress | * | cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* |
wordpress | wordpress | 0.71-gold | cpe:2.3:a:wordpress:wordpress:0.71-gold:*:*:*:*:*:*:* |
wordpress | wordpress | 1.0-platinum | cpe:2.3:a:wordpress:wordpress:1.0-platinum:*:*:*:*:*:*:* |
wordpress | wordpress | 1.0.1-miles | cpe:2.3:a:wordpress:wordpress:1.0.1-miles:*:*:*:*:*:*:* |
wordpress | wordpress | 1.0.2-blakey | cpe:2.3:a:wordpress:wordpress:1.0.2-blakey:*:*:*:*:*:*:* |
wordpress | wordpress | 1.2-delta | cpe:2.3:a:wordpress:wordpress:1.2-delta:*:*:*:*:*:*:* |
wordpress | wordpress | 1.2-mingus | cpe:2.3:a:wordpress:wordpress:1.2-mingus:*:*:*:*:*:*:* |
wordpress | wordpress | 1.2.1 | cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:* |
wordpress | wordpress | 1.2.2 | cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:* |
wordpress | wordpress | 1.5-strayhorn | cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:* |
marc.info/?l=oss-security&m=122152830017099&w=2
secunia.com/advisories/31737
secunia.com/advisories/31870
securityreason.com/securityalert/4272
securitytracker.com/id?1020869
wordpress.org/development/2008/09/wordpress-262/
www.debian.org/security/2009/dsa-1871
www.openwall.com/lists/oss-security/2008/09/11/6
www.securityfocus.com/archive/1/496287/100/0/threaded
www.securityfocus.com/bid/31068
www.sektioneins.de/advisories/SE-2008-05.txt
www.suspekt.org/2008/08/18/mysql-and-sql-column-truncation-vulnerabilities/
www.vupen.com/english/advisories/2008/2553
www.exploit-db.com/exploits/6397
www.exploit-db.com/exploits/6421
www.redhat.com/archives/fedora-package-announce/2008-September/msg00607.html
www.redhat.com/archives/fedora-package-announce/2008-September/msg00629.html