[wp-trac] Re: [WordPress Trac] #5367: Wordpress cookie
authentication vulnerability
WordPress Trac
wp-trac at lists.automattic.com
Sun Dec 2 22:18:27 GMT 2007
#5367: Wordpress cookie authentication vulnerability
-------------------------------------+--------------------------------------
Reporter: sjmurdoch | Owner: westi
Type: defect | Status: assigned
Priority: normal | Milestone: 2.4
Component: Security | Version: 2.3.1
Severity: normal | Resolution:
Keywords: security, password, md5 |
-------------------------------------+--------------------------------------
Comment (by darkdragon):
Well, there is such a thing as Session Hijacking. Any thing that features
Sessions will need to reset the Session Key after a jump in permissions.
Such as accessing the administration panel and writing posts.
So even if an attacker gains access to the session key by XSS, cookie
hijacking, or whatever, it won't matter since the token will be brief
enough.
You can take it further and implement something that SMF has, which asks
for authentication every 15 minutes to 2 hours. While this could be
annoying (and it is really annoying in my humble opinion) it would negate
most attacks such as this one and session hijacking.
--
Ticket URL: <http://trac.wordpress.org/ticket/5367#comment:28>
WordPress Trac <http://trac.wordpress.org/>
WordPress blogging software
More information about the wp-trac
mailing list