CVE-2007-6013

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.
References
Link Resource
http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/058576.html Broken Link
http://osvdb.org/40801 Broken Link
http://secunia.com/advisories/27714 Broken Link Vendor Advisory
http://secunia.com/advisories/28310 Broken Link Vendor Advisory
http://securityreason.com/securityalert/3375 Broken Link
http://trac.wordpress.org/ticket/5367 Exploit Issue Tracking
http://www.cl.cam.ac.uk/~sjm217/advisories/wordpress-cookie-auth.txt Third Party Advisory
http://www.securityfocus.com/archive/1/483927/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018980 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/3941 Broken Link Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/38578 Third Party Advisory VDB Entry
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00079.html Mailing List
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00098.html Mailing List
http://lists.grok.org.uk/pipermail/full-disclosure/2007-November/058576.html Broken Link
http://osvdb.org/40801 Broken Link
http://secunia.com/advisories/27714 Broken Link Vendor Advisory
http://secunia.com/advisories/28310 Broken Link Vendor Advisory
http://securityreason.com/securityalert/3375 Broken Link
http://trac.wordpress.org/ticket/5367 Exploit Issue Tracking
http://www.cl.cam.ac.uk/~sjm217/advisories/wordpress-cookie-auth.txt Third Party Advisory
http://www.securityfocus.com/archive/1/483927/100/0/threaded Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1018980 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/3941 Broken Link Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/38578 Third Party Advisory VDB Entry
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00079.html Mailing List
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00098.html Mailing List
Configurations

Configuration 1 (hide)

cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:7:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:8:*:*:*:*:*:*:*

History

No history.

Information

Published : 2007-11-19 21:46

Updated : 2025-04-09 00:30


NVD link : CVE-2007-6013

Mitre link : CVE-2007-6013

CVE.ORG link : CVE-2007-6013


JSON object : View

Products Affected

wordpress

  • wordpress

fedoraproject

  • fedora
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm