First published: Mon Apr 28 2008(Updated: )
The cookie authentication method in WordPress 2.5 relies on a hash of a concatenated string containing USERNAME and EXPIRY_TIME, which allows remote attackers to forge cookies by registering a username that results in the same concatenated string, as demonstrated by registering usernames beginning with "admin" to obtain administrator privileges, aka a "cryptographic splicing" issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-6013.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | =2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1930 is classified as a high severity vulnerability due to its potential for cookie forgery attacks.
To mitigate CVE-2008-1930, upgrade to WordPress version 2.5.1 or later.
CVE-2008-1930 allows remote attackers to forge authentication cookies, potentially gaining unauthorized access.
CVE-2008-1930 affects WordPress version 2.5 specifically.
Yes, CVE-2008-1930 can be easily exploited by registering specific usernames that trigger the vulnerability.