[wp-trac] Re: [WordPress Trac] #5367: Wordpress cookie authentication vulnerability

WordPress Trac wp-trac at lists.automattic.com
Sat Dec 1 16:25:34 GMT 2007

#5367: Wordpress cookie authentication vulnerability
 Reporter:  sjmurdoch                |        Owner:  westi   
     Type:  defect                   |       Status:  assigned
 Priority:  normal                   |    Milestone:  2.4     
Component:  Security                 |      Version:  2.3.1   
 Severity:  normal                   |   Resolution:          
 Keywords:  security, password, md5  |  
Comment (by darkdragon):

 Replying to [comment:22 sjmurdoch]:

 > If uniqid() isn't unpredictable, it would be possible to brute force the
 database password (the rest of the fields are pretty easy to guess in most
 situations). How secure is uniqid() in this usage?
 > Is there a better way to get unpredictable pseudorandom numbers?

 From my reading of the security, it should be {{{uniqid(microtime(),
 true)}}} for better random-ness and security.

Ticket URL: <http://trac.wordpress.org/ticket/5367#comment:25>
WordPress Trac <http://trac.wordpress.org/>
WordPress blogging software

More information about the wp-trac mailing list