The cookie authentication method in WordPress 2.5 relies on a hash of a concatenated string containing USERNAME and EXPIRY_TIME, which allows remote attackers to forge cookies by registering a username that results in the same concatenated string, as demonstrated by registering usernames beginning with "admin" to obtain administrator privileges, aka a "cryptographic splicing" issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-6013.
References
Configurations
Information
Published : 2008-04-28 13:05
Updated : 2018-10-11 13:38
NVD link : CVE-2008-1930
Mitre link : CVE-2008-1930
JSON object : View
CWE
CWE-287
Improper Authentication
Products Affected
wordpress
- wordpress