WordPress prior to 2.6.2 does not properly handle MySQL warnings about insertion of username strings that exceed the maximum column width of the user_login column, and does not properly handle space characters when comparing usernames, which allows remote malicious users to change an arbitrary user's password to a random value by registering a similar username and then requesting a password reset, related to a "SQL column truncation vulnerability." NOTE: the attacker can discover the random password by also exploiting CVE-2008-4107.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
wordpress wordpress |
||
wordpress wordpress 0.71-gold |
||
wordpress wordpress 1.0-platinum |
||
wordpress wordpress 1.0.1-miles |
||
wordpress wordpress 1.0.2-blakey |
||
wordpress wordpress 1.2-delta |
||
wordpress wordpress 1.2-mingus |
||
wordpress wordpress 1.2.1 |
||
wordpress wordpress 1.2.2 |
||
wordpress wordpress 1.5-strayhorn |
||
wordpress wordpress 1.5.1.1 |
||
wordpress wordpress 1.5.1.2 |
||
wordpress wordpress 1.5.1.3 |
||
wordpress wordpress 1.5.2 |
||
wordpress wordpress 2.0 |
||
wordpress wordpress 2.0.1 |
||
wordpress wordpress 2.0.4 |
||
wordpress wordpress 2.0.5 |
||
wordpress wordpress 2.0.6 |
||
wordpress wordpress 2.0.7 |
||
wordpress wordpress 2.0.9 |
||
wordpress wordpress 2.0.10 |
||
wordpress wordpress 2.0.11 |
||
wordpress wordpress 2.1 |
||
wordpress wordpress 2.1.1 |
||
wordpress wordpress 2.1.2 |
||
wordpress wordpress 2.1.3 |
||
wordpress wordpress 2.2 |
||
wordpress wordpress 2.2.1 |
||
wordpress wordpress 2.2.2 |
||
wordpress wordpress 2.2.3 |
||
wordpress wordpress 2.5 |
||
wordpress wordpress 2.5.1 |
||
wordpress wordpress 2.6 |