CVE-2007-6013

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.
References
Link Resource
http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/058576.html Broken Link
http://osvdb.org/40801 Broken Link
http://secunia.com/advisories/27714 Broken Link Vendor Advisory
http://secunia.com/advisories/28310 Broken Link Vendor Advisory
http://securityreason.com/securityalert/3375 Broken Link
http://trac.wordpress.org/ticket/5367 Exploit Issue Tracking
http://www.cl.cam.ac.uk/~sjm217/advisories/wordpress-cookie-auth.txt Third Party Advisory
http://www.securityfocus.com/archive/1/483927/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018980 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/3941 Broken Link Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/38578 Third Party Advisory VDB Entry
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00079.html Mailing List
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00098.html Mailing List
http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/058576.html Broken Link
http://osvdb.org/40801 Broken Link
http://secunia.com/advisories/27714 Broken Link Vendor Advisory
http://secunia.com/advisories/28310 Broken Link Vendor Advisory
http://securityreason.com/securityalert/3375 Broken Link
http://trac.wordpress.org/ticket/5367 Exploit Issue Tracking
http://www.cl.cam.ac.uk/~sjm217/advisories/wordpress-cookie-auth.txt Third Party Advisory
http://www.securityfocus.com/archive/1/483927/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018980 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/3941 Broken Link Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/38578 Third Party Advisory VDB Entry
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00079.html Mailing List
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00098.html Mailing List
Configurations

Configuration 1 (hide)

cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*

History

21 Nov 2024, 00:39

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/058576.html - Broken Link () http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/058576.html - Broken Link
References () http://osvdb.org/40801 - Broken Link () http://osvdb.org/40801 - Broken Link
References () http://secunia.com/advisories/27714 - Broken Link, Vendor Advisory () http://secunia.com/advisories/27714 - Broken Link, Vendor Advisory
References () http://secunia.com/advisories/28310 - Broken Link, Vendor Advisory () http://secunia.com/advisories/28310 - Broken Link, Vendor Advisory
References () http://securityreason.com/securityalert/3375 - Broken Link () http://securityreason.com/securityalert/3375 - Broken Link
References () http://trac.wordpress.org/ticket/5367 - Exploit, Issue Tracking () http://trac.wordpress.org/ticket/5367 - Exploit, Issue Tracking
References () http://www.cl.cam.ac.uk/~sjm217/advisories/wordpress-cookie-auth.txt - Third Party Advisory () http://www.cl.cam.ac.uk/~sjm217/advisories/wordpress-cookie-auth.txt - Third Party Advisory
References () http://www.securityfocus.com/archive/1/483927/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/483927/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1018980 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1018980 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2007/3941 - Broken Link, Vendor Advisory () http://www.vupen.com/english/advisories/2007/3941 - Broken Link, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/38578 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/38578 - Third Party Advisory, VDB Entry
References () https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00079.html - Mailing List () https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00079.html - Mailing List
References () https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00098.html - Mailing List () https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00098.html - Mailing List

09 Feb 2024, 03:15

Type Values Removed Values Added
CPE cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*
CWE CWE-287 CWE-327
References (MISC) http://www.cl.cam.ac.uk/~sjm217/advisories/wordpress-cookie-auth.txt - (MISC) http://www.cl.cam.ac.uk/~sjm217/advisories/wordpress-cookie-auth.txt - Third Party Advisory
References (OSVDB) http://osvdb.org/40801 - (OSVDB) http://osvdb.org/40801 - Broken Link
References (SECTRACK) http://www.securitytracker.com/id?1018980 - (SECTRACK) http://www.securitytracker.com/id?1018980 - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) http://trac.wordpress.org/ticket/5367 - (CONFIRM) http://trac.wordpress.org/ticket/5367 - Exploit, Issue Tracking
References (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00079.html - (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00079.html - Mailing List
References (FULLDISC) http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/058576.html - (FULLDISC) http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/058576.html - Broken Link
References (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/38578 - (XF) https://exchange.xforce.ibmcloud.com/vulnerabilities/38578 - Third Party Advisory, VDB Entry
References (SREASON) http://securityreason.com/securityalert/3375 - (SREASON) http://securityreason.com/securityalert/3375 - Broken Link
References (BUGTRAQ) http://www.securityfocus.com/archive/1/483927/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/483927/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00098.html - (FEDORA) https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00098.html - Mailing List
References (SECUNIA) http://secunia.com/advisories/27714 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/27714 - Broken Link, Vendor Advisory
References (SECUNIA) http://secunia.com/advisories/28310 - Vendor Advisory (SECUNIA) http://secunia.com/advisories/28310 - Broken Link, Vendor Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2007/3941 - Vendor Advisory (VUPEN) http://www.vupen.com/english/advisories/2007/3941 - Broken Link, Vendor Advisory
CVSS v2 : 6.8
v3 : unknown
v2 : 6.8
v3 : 9.8
First Time Fedoraproject
Fedoraproject fedora

Information

Published : 2007-11-19 21:46

Updated : 2024-11-21 00:39


NVD link : CVE-2007-6013

Mitre link : CVE-2007-6013

CVE.ORG link : CVE-2007-6013


JSON object : View

Products Affected

wordpress

  • wordpress

fedoraproject

  • fedora
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm