[wp-trac] [WordPress Trac] #45318: Security problem: Login Oracle
WordPress Trac
noreply at wordpress.org
Sun Nov 11 11:32:13 UTC 2018
#45318: Security problem: Login Oracle
--------------------------+------------------------
Reporter: d0rkpress | Owner: (none)
Type: defect (bug) | Status: closed
Priority: normal | Milestone:
Component: Security | Version:
Severity: normal | Resolution: duplicate
Keywords: | Focuses:
--------------------------+------------------------
Comment (by d0rkpress):
> Even if we changed our position and began considering usernames to be
private information, changing the messaging on the login form alone does
nothing.
??? It removes one possibility -- in security speak one attack vector.
Two reasons for this: There's a percentage of attackers who might not know
about the other ways to retrieve usernames. Or, more importantly, the
other ones are closed for an attacker because they are measures in place
to protect them.
So from the security standpoint this is a lame excuse.
> It would require restructuring author archive permalinks, breaking
changes to the REST API, educating theme developers to not use the
username in CSS classes, etc.
Don't know what you are referring to, but changing the failed login
message to what is standard since 15 years doesn't involve a change like
this. There's a diff attached to the 12 year old ticket and my guess
without looking at the code today is that it is no big change as you
indicated.
> But this has all been discussed many times across a bunch of tickets. If
you have more to add to the conversation, you can continue the discussion
on this ticket without reopening it.
I got that and it doesn't make sense to repeat it over and over to me. It
seems to me like an excuse that you even don't want to think about it as
it requires to leave your comfortable position. Do really you understand
the security problem here? Do you acknowledge it? Do you want to think
about addressing it somehow in the future?
Insisting on your paradigm doesn't reflect my reality. I do not have good
statistics but from the like 10 installations I personally know the
operators from, zero want to have the usernames public. And they use every
means to keep it that way. This is because they know the math, see my
previous post.
So if you are really willing to think about the possibilities closing the
other security loopholes I am sure that they will be ways to protect the
retrieval of user information per default -- at least for those who want
to.
Independent on those loopholes: changing the login message to not leak
usernames is a no-brainer.
Please fix that.
https://www.owasp.org/index.php/Authentication_Cheat_Sheet#Incorrect_Response_Examples
https://nvd.nist.gov/800-53/Rev4/control/SI-11
https://cwe.mitre.org/data/definitions/210.html
--
Ticket URL: <https://core.trac.wordpress.org/ticket/45318#comment:9>
WordPress Trac <https://core.trac.wordpress.org/>
WordPress publishing platform
More information about the wp-trac
mailing list