Vulnerability Name: | CVE-2008-5113 (CCN-46698) | ||||||||||||||||||||
Assigned: | 2008-11-07 | ||||||||||||||||||||
Published: | 2008-11-07 | ||||||||||||||||||||
Updated: | 2017-08-08 | ||||||||||||||||||||
Summary: | WordPress 2.6.3 relies on the REQUEST superglobal array in certain dangerous situations, which makes it easier for remote attackers to conduct delayed and persistent cross-site request forgery (CSRF) attacks via crafted cookies, as demonstrated by attacks that (1) delete user accounts or (2) cause a denial of service (loss of application access). Note: this issue relies on the presence of an independent vulnerability that allows cookie injection. | ||||||||||||||||||||
CVSS v3 Severity: | 3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||||||||||||||||
CVSS v2 Severity: | 4.0 Medium (CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:P) 2.8 Low (Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:P/E:U/RL:OF/RC:UR)
1.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:UR)
| ||||||||||||||||||||
Vulnerability Type: | CWE-352 | ||||||||||||||||||||
Vulnerability Consequences: | Other | ||||||||||||||||||||
References: | Source: CONFIRM Type: UNKNOWN http://bugs.debian.org/504771 Source: CCN Type: Debian Bug report logs - #504771 wordpress can be subject of delayed attacks via cookies Source: MITRE Type: CNA CVE-2008-5113 Source: CCN Type: oss-security Mailing List, Thu, 13 Nov 2008 21:05:17 -0600 CVE request: wordpress can be subject of delayed attacks via cookies Source: MLIST Type: UNKNOWN [oss-security] 20081113 CVE request: wordpress can be subject of delayed attacks via cookies Source: CCN Type: WordPress Web site WordPress Source: DEBIAN Type: UNKNOWN DSA-1871 Source: DEBIAN Type: DSA-1871 wordpress -- several vulnerabilities Source: CCN Type: OSVDB ID: 50881 WordPress REQUEST Superglobal Array Crafted Cookie Handling CSRF Source: XF Type: UNKNOWN wordpress-request-weak-security(46698) Source: XF Type: UNKNOWN wordpress-request-weak-security(46698) | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |