WordPress 3.4.2 Sessions Not Terminated Upon Explicit User Logout

2012.12.21
Risk: Low
Local: No
Remote: Yes
CWE: N/A


CVSS Base Score: 2.6/10
Impact Subscore: 2.9/10
Exploitability Subscore: 4.9/10
Exploit range: Remote
Attack complexity: High
Authentication: No required
Confidentiality impact: Partial
Integrity impact: None
Availability impact: None

*Summary ======= WordPress 3.4.2 fails to invalidate a user’s sessions upon logout. WordPress was originally notified of this issue in November 15, 2012. CVE number: CVE-2012-5868 Impact: Medium Vendor homepage: http://wordpress.com/ Vendor notified: 11/2012 Vendor fixed: N/A Credit: Christopher Emerson of White Oak Security (http://www.whiteoaksecurity.com/) Affected Products ======== ======== Confirmed in self-hosted version WordPress 3.4.2. Other versions may also be affected. Details ======= When a user explicitly logs out of the WordPress 3.4.2 Administrator interface via the logout link (https://domainname.com/wp-login.php?action=logout), Wordpress clears the cookies in the user’s browser, but fails to invalidate the session cookie within the application. A malicious user can take a a previously authenticated user’s session cookie (wordpress_sec), add that cookie to a request for the administrator interface (example https://domainname.com/wp-admin/profile.php), and they will have access to the interface with the same roles and privileges as the original valid user. Impact ====== This vulnerability lengthens the windows for brute force session identifier guessing attacks and session identifier replay attacks. Successful exploitation would allow attackers to masquerade as the victim within the application. Solution ======== Since the WordPress does not have server side session management, the application should keep track of session identifiers where a user has explicitly logged out, and prevent those sessions from connecting to the application. Distribution ============ This vulnerability was published publicly on December 17th, 2012. *

References:

http://wordpress.com/


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top