Vulnerability CVE-2017-14990


Published: 2017-10-02   Modified: 2017-10-03

Description:
WordPress 4.8.2 stores cleartext wp_signups.activation_key values (but stores the analogous wp_users.user_activation_key values as hashes), which might make it easier for remote attackers to hijack unactivated user accounts by leveraging database read access (such as access gained through an unspecified SQL injection vulnerability).

See advisories in our WLB2 database:
Topic
Author
Date
Med.
WordPress does not hash wp_signups.activation_key SQL injection to create accounts
Glyn Wintle
07.10.2017
Low
WordPress 4.8.2 Activation Key Failed Expiry
Glyn Wintle
08.10.2017

Type:

CWE-312

(Cleartext Storage of Sensitive Information)

CVSS2 => (AV:N/AC:L/Au:S/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4/10
2.9/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Wordpress -> Wordpress 
Debian -> Debian linux 

 References:
http://www.securitytracker.com/id/1039554
https://core.trac.wordpress.org/ticket/38474
https://www.debian.org/security/2017/dsa-3997

Copyright 2024, cxsecurity.com

 

Back to Top