Improper Authentication Affecting wordpress package, versions <2.5.0-1
Threat Intelligence
EPSS
0.78% (82nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIANUNSTABLE-WORDPRESS-363118
- published 19 Nov 2007
- disclosed 19 Nov 2007
Introduced: 19 Nov 2007
CVE-2007-6013 Open this link in a new tabHow to fix?
Upgrade Debian:unstable
wordpress
to version 2.5.0-1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream wordpress
package and not the wordpress
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.
References
- https://security-tracker.debian.org/tracker/CVE-2007-6013
- http://www.securityfocus.com/archive/1/483927/100/0/threaded
- http://trac.wordpress.org/ticket/5367
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00079.html
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00098.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/058576.html
- http://www.cl.cam.ac.uk/~sjm217/advisories/wordpress-cookie-auth.txt
- http://osvdb.org/40801
- http://secunia.com/advisories/27714
- http://secunia.com/advisories/28310
- http://www.securitytracker.com/id?1018980
- http://securityreason.com/securityalert/3375
- http://www.vupen.com/english/advisories/2007/3941
- https://exchange.xforce.ibmcloud.com/vulnerabilities/38578
CVSS Scores
version 3.1