CVE-2007-6013
WordPress Core 1.5 - 2.3.1 - Authorization Bypass
Severity Score
9.8
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.
Wordpress versiones 1.5 hasta 2.3.1, usa valores de cookies basados ??en el hash MD5 de un hash MD5 de contraseñas, lo que permite a atacantes omitir la autenticación mediante la obtención del hash MD5 desde la base de datos del usuario, y luego generar la cookie de autenticación a partir de ese hash.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2007-11-19 CVE Reserved
- 2007-11-19 CVE Published
- 2024-08-07 CVE Updated
- 2024-08-07 First Exploit
- 2024-10-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-288: Authentication Bypass Using an Alternate Path or Channel
- CWE-327: Use of a Broken or Risky Cryptographic Algorithm
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/058576.html | Broken Link | |
http://osvdb.org/40801 | Broken Link | |
http://securityreason.com/securityalert/3375 | Broken Link | |
http://www.cl.cam.ac.uk/~sjm217/advisories/wordpress-cookie-auth.txt | Third Party Advisory | |
http://www.securityfocus.com/archive/1/483927/100/0/threaded | Broken Link | |
http://www.securitytracker.com/id?1018980 | Broken Link | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/38578 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
http://trac.wordpress.org/ticket/5367 | 2024-08-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/27714 | 2024-02-09 | |
http://secunia.com/advisories/28310 | 2024-02-09 | |
http://www.vupen.com/english/advisories/2007/3941 | 2024-02-09 | |
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00079.html | 2024-02-09 | |
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00098.html | 2024-02-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Wordpress Search vendor "Wordpress" | Wordpress Search vendor "Wordpress" for product "Wordpress" | >= 1.5 <= 2.3.1 Search vendor "Wordpress" for product "Wordpress" and version " >= 1.5 <= 2.3.1" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 7 Search vendor "Fedoraproject" for product "Fedora" and version "7" | - |
Affected
| ||||||
Fedoraproject Search vendor "Fedoraproject" | Fedora Search vendor "Fedoraproject" for product "Fedora" | 8 Search vendor "Fedoraproject" for product "Fedora" and version "8" | - |
Affected
|