WordPress before 4.4 makes it easier for remote attackers to predict password-recovery tokens via a brute-force approach.
The product contains a mechanism for users to recover or change their passwords without knowing the original password, but the mechanism is weak.
Link | Tags |
---|---|
http://packetstormsecurity.com/files/130380/WordPress-Failed-Randomness.html | vdb entry third party advisory |
https://core.trac.wordpress.org/ticket/28633 | issue tracking vendor advisory |
http://seclists.org/fulldisclosure/2015/Feb/53 | third party advisory mailing list |
http://www.securityfocus.com/bid/72589 | vdb entry third party advisory |
http://seclists.org/fulldisclosure/2015/Feb/42 | third party advisory mailing list |
http://www.securitytracker.com/id/1031749 | vdb entry third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1192474 | issue tracking third party advisory |