wp-includes/ms-functions.php in the Multisite WordPress API in WordPress before 4.7.1 does not properly choose random numbers for keys, which makes it easier for remote attackers to bypass intended access restrictions via a crafted (1) site signup or (2) user signup.
References
Configurations
History
21 Nov 2024, 03:27
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.debian.org/security/2017/dsa-3779 - | |
References | () http://www.openwall.com/lists/oss-security/2017/01/14/6 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/95401 - | |
References | () http://www.securitytracker.com/id/1037591 - | |
References | () https://codex.wordpress.org/Version_4.7.1 - Release Notes, Vendor Advisory | |
References | () https://github.com/WordPress/WordPress/commit/cea9e2dc62abf777e06b12ec4ad9d1aaa49b29f4 - Patch | |
References | () https://wordpress.org/news/2017/01/wordpress-4-7-1-security-and-maintenance-release/ - Vendor Advisory | |
References | () https://wpvulndb.com/vulnerabilities/8721 - |
Information
Published : 2017-01-15 02:59
Updated : 2024-11-21 03:27
NVD link : CVE-2017-5493
Mitre link : CVE-2017-5493
CVE.ORG link : CVE-2017-5493
JSON object : View
Products Affected
wordpress
- wordpress
CWE
CWE-338
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)