WordPress before 4.4 makes it easier for remote attackers to predict password-recovery tokens via a brute-force approach.
References
Link | Resource |
---|---|
https://core.trac.wordpress.org/ticket/28633 | Issue Tracking Vendor Advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1192474 | Issue Tracking Third Party Advisory |
http://www.securitytracker.com/id/1031749 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/72589 | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2015/Feb/53 | Mailing List Third Party Advisory |
http://seclists.org/fulldisclosure/2015/Feb/42 | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/130380/WordPress-Failed-Randomness.html | Third Party Advisory VDB Entry |
Configurations
Information
Published : 2018-04-12 14:29
Updated : 2018-05-17 07:38
NVD link : CVE-2014-6412
Mitre link : CVE-2014-6412
JSON object : View
CWE
CWE-640
Weak Password Recovery Mechanism for Forgotten Password
Products Affected
wordpress
- wordpress