[wp-trac] Re: [WordPress Trac] #5367: Wordpress cookie
authentication vulnerability
WordPress Trac
wp-trac at lists.automattic.com
Tue Dec 11 12:42:16 GMT 2007
#5367: Wordpress cookie authentication vulnerability
-------------------------------------+--------------------------------------
Reporter: sjmurdoch | Owner: westi
Type: defect | Status: assigned
Priority: normal | Milestone: 2.4
Component: Security | Version: 2.3.1
Severity: normal | Resolution:
Keywords: security, password, md5 |
-------------------------------------+--------------------------------------
Comment (by sjmurdoch):
Replying to [comment:41 ryan]:
> Even with a block cipher we still have to worry about someone getting
the key if it is stored in the DB, yes?
The rough idea I was thinking of is storing the encrypted hash of the
password in the cookie, and the double hash in the database. Then if an
attacker can read the key and double-hash, they can still not generate a
valid cookie.
> Don't know if it's any good.
>
> http://www.jonasjohn.de/snippets/php/md5-based-block-cipher.htm
It looks a bit weird (it's not CFB, like it says and it's not quite OFB
either). Maybe it works though, but it needs more thought.
--
Ticket URL: <http://trac.wordpress.org/ticket/5367#comment:42>
WordPress Trac <http://trac.wordpress.org/>
WordPress blogging software
More information about the wp-trac
mailing list