WordPress 4.8.2 stores cleartext wp_signups.activation_key values (but stores the analogous wp_users.user_activation_key values as hashes), which might make it easier for remote attackers to hijack unactivated user accounts by leveraging database read access (such as access gained through an unspecified SQL injection vulnerability).
References
Link | Resource |
---|---|
https://core.trac.wordpress.org/ticket/38474 | Exploit Issue Tracking Third Party Advisory |
http://www.securitytracker.com/id/1039554 | Third Party Advisory VDB Entry |
https://www.debian.org/security/2017/dsa-3997 | Third Party Advisory |
Information
Published : 2017-10-02 18:29
Updated : 2019-10-02 17:03
NVD link : CVE-2017-14990
Mitre link : CVE-2017-14990
JSON object : View
CWE
CWE-312
Cleartext Storage of Sensitive Information
Products Affected
debian
- debian_linux
wordpress
- wordpress