[wp-trac] Re: [WordPress Trac] #5367: Wordpress cookie authentication vulnerability

WordPress Trac wp-trac at lists.automattic.com
Thu Dec 13 11:52:44 GMT 2007


#5367: Wordpress cookie authentication vulnerability
-------------------------------------+--------------------------------------
 Reporter:  sjmurdoch                |        Owner:  westi   
     Type:  defect                   |       Status:  assigned
 Priority:  normal                   |    Milestone:  2.4     
Component:  Security                 |      Version:  2.3.1   
 Severity:  normal                   |   Resolution:          
 Keywords:  security, password, md5  |  
-------------------------------------+--------------------------------------
Comment (by DD32):

 Replying to [comment:45 sjmurdoch]:
 > That sounds like a bad idea to me. The database password is too short to
 resist an offline brute force/dictionary attack. If we use it in the
 cookie, anyone could discover the password with a bit of work.

 It'd more than just the password, And its allready in use, If you use
 multiple pieces and do an md5 or so of them, then its unlikely an attacker
 will back-engineer it.
 {{{
 wp-includes/cache.php:
 $this->secret = DB_PASSWORD . DB_USER .
 DB_NAME . DB_HOST . ABSPATH;
 }}}

-- 
Ticket URL: <http://trac.wordpress.org/ticket/5367#comment:46>
WordPress Trac <http://trac.wordpress.org/>
WordPress blogging software


More information about the wp-trac mailing list