[wp-hackers] Security Vulnerability found
Mark Jaquith
mark.wordpress at txfx.net
Wed Apr 13 21:21:37 GMT 2005
Robert Deaton wrote:
> The way I see this, it is entirely silly that someone would post such
> a vunerability.
>
> As far as Denis' comments, if I remember correctly passwords are
> stored as a double hashed md5, which would be very tiresome to
> reverse, although it would still be possible, but this isn't the way a
> person would go about stealing accounts imho. As far as IP address
> checking, it inadvertantly defeats the purpose of cookies for those
> who are on dialup or an ISP that changes IP addresses constantly. As
> far as optionally logging off after a certain period, WordPress
> already does it, although it is a very long period. If someone leaves
> their blog logged in at a cybercafe, there's not much that can be done
> to help, except moving to sessions so that when the browser is closed
> the session is destroyed. I had a working hacked together session
> script, but its been lost in my clutter, but maybe it is something we
> should consider and do like many sites do by having a checkbox to use
> sessions if at a public terminal.
Jennifer suggested this back in October:
http://mosquito.wordpress.org/view.php?id=379
I think a "Remember me" checkbox on login would be really useful. It's
worked well for Movable Type. I'm just always afraid that I'm going to
log in at a public place and forget to log out.
More information about the wp-hackers
mailing list