[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248678

 
 

909

 
 

195426

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

CVE-2017-8295 -- wordpress

ID: oval:org.secpod.oval:def:1901540Date: (C)2019-03-05   (M)2023-12-20
Class: VULNERABILITYFamily: unix




WordPress through 4.7.4 relies on the Host HTTP header for a password-reset e-mail message, which makes it easier for remote attackers to reset arbitrary passwords by making a crafted wp-login.php?action=lostpassword request and then arranging for this message to bounce or be resent, leading to transmission of the reset key to a mailbox on an attacker-controlled SMTP server. This is related to problematic use of the SERVER_NAME variable in wp-includes/pluggable.php in conjunction with the PHP mail function. Exploitation is not achievable in all cases because it requires at least one of the following: the attacker can prevent the victim from receiving any e-mail messages for an extended period of time , the victim"s e-mail system sends an autoresponse containing the original message, or the victim manually composes a reply containing the original message.

Platform:
Ubuntu 16.04
Ubuntu 14.04
Product:
wordpress
Reference:
CVE-2017-8295
CVE    1
CVE-2017-8295
CPE    3
cpe:/o:ubuntu:ubuntu_linux:16.04
cpe:/o:ubuntu:ubuntu_linux:14.04
cpe:/a:wordpress:wordpress

© SecPod Technologies