WordPress 4.8.2 stores cleartext wp_signups.activation_key values (but stores the analogous wp_users.user_activation_key values as hashes), which might make it easier for remote attackers to hijack unactivated user accounts by leveraging database read access (such as access gained through an unspecified SQL injection vulnerability).
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1039554 | Third Party Advisory VDB Entry |
https://core.trac.wordpress.org/ticket/38474 | Exploit Issue Tracking Third Party Advisory |
https://www.debian.org/security/2017/dsa-3997 | Third Party Advisory |
http://www.securitytracker.com/id/1039554 | Third Party Advisory VDB Entry |
https://core.trac.wordpress.org/ticket/38474 | Exploit Issue Tracking Third Party Advisory |
https://www.debian.org/security/2017/dsa-3997 | Third Party Advisory |
Configurations
History
21 Nov 2024, 03:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securitytracker.com/id/1039554 - Third Party Advisory, VDB Entry | |
References | () https://core.trac.wordpress.org/ticket/38474 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://www.debian.org/security/2017/dsa-3997 - Third Party Advisory |
Information
Published : 2017-10-03 01:29
Updated : 2024-11-21 03:13
NVD link : CVE-2017-14990
Mitre link : CVE-2017-14990
CVE.ORG link : CVE-2017-14990
JSON object : View
Products Affected
debian
- debian_linux
wordpress
- wordpress
CWE
CWE-312
Cleartext Storage of Sensitive Information