WordPress and WordPress MU before 2.8.1 exhibit different behavior for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience."
References
Link | Resource |
---|---|
http://securitytracker.com/id?1022528 | Third Party Advisory VDB Entry |
http://www.vupen.com/english/advisories/2009/1833 | Patch Vendor Advisory |
http://www.osvdb.org/55713 | Broken Link |
http://www.securityfocus.com/bid/35581 | Third Party Advisory VDB Entry |
http://corelabs.coresecurity.com/index.php?action=view&type=advisory&name=WordPress_Privileges_Unchecked | Exploit Third Party Advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html | Third Party Advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html | Third Party Advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html | Third Party Advisory |
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html | Third Party Advisory |
http://www.exploit-db.com/exploits/9110 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/504795/100/0/threaded | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2009-07-10 14:00
Updated : 2018-11-08 12:38
NVD link : CVE-2009-2335
Mitre link : CVE-2009-2335
JSON object : View
CWE
CWE-16
Configuration
Products Affected
wordpress
- wordpress_mu
- wordpress