Vulnerability Name: | CVE-2014-6412 (CCN-100887) | ||||||||||||
Assigned: | 2014-09-15 | ||||||||||||
Published: | 2015-02-10 | ||||||||||||
Updated: | 2018-05-17 | ||||||||||||
Summary: | WordPress before 4.4 makes it easier for remote attackers to predict password-recovery tokens via a brute-force approach. | ||||||||||||
CVSS v3 Severity: | 8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
| ||||||||||||
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
| ||||||||||||
Vulnerability Type: | CWE-640 | ||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2014-6412 Source: MISC Type: Third Party Advisory, VDB Entry http://packetstormsecurity.com/files/130380/WordPress-Failed-Randomness.html Source: CCN Type: Full Disclosure Mailing List, Tue, 10 Feb 2015 11:50:16 -0500 CVE-2014-6412 - WordPress (all versions) lacks CSPRNG Source: FULLDISC Type: Mailing List, Third Party Advisory 20150211 CVE-2014-6412 - WordPress (all versions) lacks CSPRNG Source: FULLDISC Type: Mailing List, Third Party Advisory 20150212 Followup on CVE-2014-6412 Source: BID Type: Third Party Advisory, VDB Entry 72589 Source: CCN Type: BID-72589 WordPress CVE-2014-6412 Security Weakness Source: SECTRACK Type: Third Party Advisory, VDB Entry 1031749 Source: CONFIRM Type: Issue Tracking, Third Party Advisory https://bugzilla.redhat.com/show_bug.cgi?id=1192474 Source: CCN Type: WordPress Trac Web site 28633.3.patch on Ticket #28633 Attachment WordPress Trac Source: CONFIRM Type: Issue Tracking, Vendor Advisory https://core.trac.wordpress.org/ticket/28633 Source: XF Type: UNKNOWN wp-cve20146412-weak-security(100887) | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |