[Forgot Password]
Login  Register Subscribe

23631

 
 

122183

 
 

98060

 
 

909

 
 

79198

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-5113

Date: (C)2008-11-17   (M)2017-11-18 


WordPress 2.6.3 relies on the REQUEST superglobal array in certain dangerous situations, which makes it easier for remote attackers to conduct delayed and persistent cross-site request forgery (CSRF) attacks via crafted cookies, as demonstrated by attacks that (1) delete user accounts or (2) cause a denial of service (loss of application access). NOTE: this issue relies on the presence of an independent vulnerability that allows cookie injection.

CVSS Score: 4.0Access Vector: NETWORK
Exploit Score: 4.9Access Complexity: HIGH
Impact Score: 4.9Authentication: NONE
 Confidentiality: NONE
 Integrity: PARTIAL
 Availability: PARTIAL





Reference:
DSA-1871
http://openwall.com/lists/oss-security/2008/11/14/1
http://bugs.debian.org/504771
wordpress-request-weak-security(46698)

CPE    1
cpe:/a:wordpress:wordpress:2.6.3
CWE    1
CWE-352
OVAL    3
oval:org.mitre.oval:def:8072
oval:org.secpod.oval:def:600328
oval:org.secpod.oval:def:600449

© 2013 SecPod Technologies