Vulnerability Name: | CVE-2017-8295 (CCN-125642) | ||||||||||||||||||||||||||||||||||||||||||||
Assigned: | 2017-05-03 | ||||||||||||||||||||||||||||||||||||||||||||
Published: | 2017-05-03 | ||||||||||||||||||||||||||||||||||||||||||||
Updated: | 2017-11-04 | ||||||||||||||||||||||||||||||||||||||||||||
Summary: | WordPress through 4.7.4 relies on the Host HTTP header for a password-reset e-mail message, which makes it easier for remote attackers to reset arbitrary passwords by making a crafted wp-login.php?action=lostpassword request and then arranging for this message to bounce or be resent, leading to transmission of the reset key to a mailbox on an attacker-controlled SMTP server. This is related to problematic use of the SERVER_NAME variable in wp-includes/pluggable.php in conjunction with the PHP mail function. Exploitation is not achievable in all cases because it requires at least one of the following: (1) the attacker can prevent the victim from receiving any e-mail messages for an extended period of time (such as 5 days), (2) the victim's e-mail system sends an autoresponse containing the original message, or (3) the victim manually composes a reply containing the original message. | ||||||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 5.9 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N) 5.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:P/RL:U/RC:R)
4.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:U/RC:R)
| ||||||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
| ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-640 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Bypass Security | ||||||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-8295 Source: CCN Type: BugTraq Mailing List, Wed, 3 May 2017 17:36:22 -0300 WordPress Core <= 4.7.4 Potential Unauthorized Password Reset (0day) [CVE-2017-8295] Source: DEBIAN Type: UNKNOWN DSA-3870 Source: BID Type: Third Party Advisory, VDB Entry 98295 Source: CCN Type: BID-98295 WordPress Password Reset CVE-2017-8295 Security Bypass Vulnerability Source: SECTRACK Type: UNKNOWN 1038403 Source: CCN Type: WordPress Web site WordPress.com - Create a WordPress Site? Source: XF Type: UNKNOWN wp-core-cve20178295-sec-bypass(125642) Source: MISC Type: Exploit, Technical Description, Third Party Advisory https://exploitbox.io/vuln/WordPress-Exploit-4-7-Unauth-Password-Reset-0day-CVE-2017-8295.html Source: MISC Type: UNKNOWN https://wpvulndb.com/vulnerabilities/8807 Source: EXPLOIT-DB Type: Exploit, Third Party Advisory 41963 | ||||||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||||||
BACK |