First published: Thu Sep 18 2008(Updated: )
WordPress before 2.6.2 does not properly handle MySQL warnings about insertion of username strings that exceed the maximum column width of the user_login column, and does not properly handle space characters when comparing usernames, which allows remote attackers to change an arbitrary user's password to a random value by registering a similar username and then requesting a password reset, related to a "SQL column truncation vulnerability." NOTE: the attacker can discover the random password by also exploiting CVE-2008-4107.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <=2.6.1 | |
WordPress | =0.71-gold | |
WordPress | =1.0-platinum | |
WordPress | =1.0.1-miles | |
WordPress | =1.0.2-blakey | |
WordPress | =1.2-delta | |
WordPress | =1.2-mingus | |
WordPress | =1.2.1 | |
WordPress | =1.2.2 | |
WordPress | =1.5-strayhorn | |
WordPress | =1.5.1.1 | |
WordPress | =1.5.1.2 | |
WordPress | =1.5.1.3 | |
WordPress | =1.5.2 | |
WordPress | =2.0 | |
WordPress | =2.0.1 | |
WordPress | =2.0.4 | |
WordPress | =2.0.5 | |
WordPress | =2.0.6 | |
WordPress | =2.0.7 | |
WordPress | =2.0.9 | |
WordPress | =2.0.10 | |
WordPress | =2.0.11 | |
WordPress | =2.1 | |
WordPress | =2.1.1 | |
WordPress | =2.1.2 | |
WordPress | =2.1.3 | |
WordPress | =2.2 | |
WordPress | =2.2.1 | |
WordPress | =2.2.2 | |
WordPress | =2.2.3 | |
WordPress | =2.5 | |
WordPress | =2.5.1 | |
WordPress | =2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.