Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.103222
Categoría:Web application abuses
Título:WordPress User IDs and User Names Disclosure
Resumen:WordPress platforms use a parameter called `author'. This parameter; accepts integer values and represents the `User ID' of users in the; web site. For example: http://www.example.com/?author=1
Descripción:Summary:
WordPress platforms use a parameter called `author'. This parameter
accepts integer values and represents the `User ID' of users in the
web site. For example: http://www.example.com/?author=1

Vulnerability Insight:
The problems found are:

1. User ID values are generated consecutively.

2. When a valid User ID is found, WordPress redirects to a web page
with the name of the author.

Vulnerability Impact:
These problems trigger the following attack vectors:

1. The query response discloses whether the User ID is enabled.

2. The query response leaks (by redirection) the User Name
corresponding with that User ID.

Solution:
No known solution was made available for at least one year since the disclosure of this vulnerability.
Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the
product or replace the product by another one.

CVSS Score:
5.8

CVSS Vector:
AV:A/AC:L/Au:N/C:P/I:P/A:P

CopyrightCopyright (C) 2011 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.