Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2008-1930

Description

The cookie authentication method in WordPress 2.5 relies on a hash of a concatenated string containing USERNAME and EXPIRY_TIME, which allows remote attackers to forge cookies by registering a username that results in the same concatenated string, as demonstrated by registering usernames beginning with "admin" to obtain administrator privileges, aka a "cryptographic splicing" issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-6013.

POC

Reference

No PoCs from references.

Github

- https://github.com/20142995/nuclei-templates

- https://github.com/J-16/Pentester-Bootcamp

- https://github.com/RedisMadani/cyber-vault

- https://github.com/dxktw/cyber-vault

- https://github.com/nemocyberworld/Captain-Nemo

- https://github.com/nemocyberworld/captain-nemo

- https://github.com/nicmmrob/Pentester-Bootcamp

- https://github.com/paulveillard/cybersecurity-infosec