[wp-trac] Re: [WordPress Trac] #5367: Wordpress cookie
authentication vulnerability
WordPress Trac
wp-trac at lists.automattic.com
Tue Nov 20 22:49:52 GMT 2007
#5367: Wordpress cookie authentication vulnerability
-------------------------------------+--------------------------------------
Reporter: sjmurdoch | Owner: anonymous
Type: defect | Status: new
Priority: normal | Milestone: 2.4
Component: Security | Version: 2.3.1
Severity: normal | Resolution:
Keywords: security, password, md5 |
-------------------------------------+--------------------------------------
Comment (by dougal):
On the one hand, this is yet another case of "Let's take some generic,
lame, bad security scenario, slap the name 'WordPress' on it (for no
apparent reason other than the fact that WP is popular), and release a
security announcement!" As has already been noted, if an attacker already
has read access to your database, then you've probably lost the battle,
regardless of anything else.
On the other hand, we could definitely stand to improve the security of
the cookie authentication. Things are the way they are now to make it
convenient for the user. But it's really hard to provide convenient
persistent authentication in a secure fashion without some external method
of security (e.g. SSL). We probably need to provide better support for SSL
(when it's available), or lose the persistence in most cases. There might
be situations where we can provide persistence more securely, but probably
not in all server setups.
--
Ticket URL: <http://trac.wordpress.org/ticket/5367#comment:10>
WordPress Trac <http://trac.wordpress.org/>
WordPress blogging software
More information about the wp-trac
mailing list