Lucene search

K
nvd[email protected]NVD:CVE-2008-1930
HistoryApr 28, 2008 - 8:05 p.m.

CVE-2008-1930

2008-04-2820:05:00
CWE-287
web.nvd.nist.gov
7

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

9.6

Confidence

High

EPSS

0.012

Percentile

85.7%

The cookie authentication method in WordPress 2.5 relies on a hash of a concatenated string containing USERNAME and EXPIRY_TIME, which allows remote attackers to forge cookies by registering a username that results in the same concatenated string, as demonstrated by registering usernames beginning with โ€œadminโ€ to obtain administrator privileges, aka a โ€œcryptographic splicingโ€ issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-6013.

Affected configurations

Nvd
Node
wordpresswordpressMatch2.5
VendorProductVersionCPE
wordpresswordpress2.5cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

9.6

Confidence

High

EPSS

0.012

Percentile

85.7%