CVE-2008-5113

WordPress 2.6.3 relies on the REQUEST superglobal array in certain dangerous situations, which makes it easier for remote attackers to conduct delayed and persistent cross-site request forgery (CSRF) attacks via crafted cookies, as demonstrated by attacks that (1) delete user accounts or (2) cause a denial of service (loss of application access). NOTE: this issue relies on the presence of an independent vulnerability that allows cookie injection.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*

History

21 Nov 2024, 00:53

Type Values Removed Values Added
References () http://bugs.debian.org/504771 - () http://bugs.debian.org/504771 -
References () http://openwall.com/lists/oss-security/2008/11/14/1 - () http://openwall.com/lists/oss-security/2008/11/14/1 -
References () http://www.debian.org/security/2009/dsa-1871 - () http://www.debian.org/security/2009/dsa-1871 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/46698 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/46698 -

Information

Published : 2008-11-17 23:30

Updated : 2024-11-21 00:53


NVD link : CVE-2008-5113

Mitre link : CVE-2008-5113

CVE.ORG link : CVE-2008-5113


JSON object : View

Products Affected

wordpress

  • wordpress
CWE
CWE-352

Cross-Site Request Forgery (CSRF)