[wp-trac] [WordPress Trac] #25428: All administrator, authors, usernames able to be discovered

WordPress Trac noreply at wordpress.org
Tue Oct 1 03:47:07 UTC 2013


#25428: All administrator, authors, usernames able to be discovered
--------------------------+------------------------
 Reporter:  taipo         |       Owner:
     Type:  defect (bug)  |      Status:  closed
 Priority:  normal        |   Milestone:
Component:  Users         |     Version:  3.6.1
 Severity:  normal        |  Resolution:  duplicate
 Keywords:                |
--------------------------+------------------------

Comment (by taipo):

 I think the reason why we keep submitting this to be fixed is because it
 is now common practice to change the name of the initial admin to
 something obscure, and not use it as the primary username to post from.
 Many users are now setting up another user with the lowest posting role
 possible as their primary posting user to protect any username with
 administrator powers from being discovered and therefore bruteforced. For
 the reasons that 1/ some sites are actually being brute force cracked even
 with what they believe is a difficult to crack passwords, and 2/ webhosts
 tend to find breaches of terms of services faster when its your website
 slowing their servers down, and this leads to your site being removed or
 at least receiving a warning about CPU usage or something similar.

 This is because right now there are a series of botnets brute-forcing
 Wordpress logins in this very fashion, first they scan the first 2-3 user
 id numbers, /i.e /?author=2, /?author=3, etc, then those usernames that
 are discovered from the pages that load from those requests are
 jackhammered until their hashes are cracked. The botnets appear to have a
 lot of resources and are not phased in the slightest by IP banning, but
 they do appear to move on presumably to another site on their list when
 via some clever .htaccess code, we ban access to ?author=(some number).

 Meanwhile the servers on which the WP websites that receive this type of
 attention sit, are receiving denial of service attacks which invariably
 leads to breach of terms of service by the webhosts, and on and on it
 goes.

 So what is needed to prevent this attack is a simple on off setting for
 public viewing of usernames.

--
Ticket URL: <http://core.trac.wordpress.org/ticket/25428#comment:2>
WordPress Trac <http://core.trac.wordpress.org/>
WordPress blogging software


More information about the wp-trac mailing list