[wp-trac] Re: [WordPress Trac] #5367: Wordpress cookie authentication vulnerability

WordPress Trac wp-trac at lists.automattic.com
Sun Dec 2 22:18:27 GMT 2007


#5367: Wordpress cookie authentication vulnerability
-------------------------------------+--------------------------------------
 Reporter:  sjmurdoch                |        Owner:  westi   
     Type:  defect                   |       Status:  assigned
 Priority:  normal                   |    Milestone:  2.4     
Component:  Security                 |      Version:  2.3.1   
 Severity:  normal                   |   Resolution:          
 Keywords:  security, password, md5  |  
-------------------------------------+--------------------------------------
Comment (by darkdragon):

 Well, there is such a thing as Session Hijacking. Any thing that features
 Sessions will need to reset the Session Key after a jump in permissions.
 Such as accessing the administration panel and writing posts.

 So even if an attacker gains access to the session key by XSS, cookie
 hijacking, or whatever, it won't matter since the token will be brief
 enough.

 You can take it further and implement something that SMF has, which asks
 for authentication every 15 minutes to 2 hours. While this could be
 annoying (and it is really annoying in my humble opinion) it would negate
 most attacks such as this one and session hijacking.

-- 
Ticket URL: <http://trac.wordpress.org/ticket/5367#comment:28>
WordPress Trac <http://trac.wordpress.org/>
WordPress blogging software


More information about the wp-trac mailing list