Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.103222
Category:Web application abuses
Title:WordPress User IDs and User Names Disclosure
Summary:WordPress platforms use a parameter called `author'. This parameter; accepts integer values and represents the `User ID' of users in the; web site. For example: http://www.example.com/?author=1
Description:Summary:
WordPress platforms use a parameter called `author'. This parameter
accepts integer values and represents the `User ID' of users in the
web site. For example: http://www.example.com/?author=1

Vulnerability Insight:
The problems found are:

1. User ID values are generated consecutively.

2. When a valid User ID is found, WordPress redirects to a web page
with the name of the author.

Vulnerability Impact:
These problems trigger the following attack vectors:

1. The query response discloses whether the User ID is enabled.

2. The query response leaks (by redirection) the User Name
corresponding with that User ID.

Solution:
No known solution was made available for at least one year since the disclosure of this vulnerability.
Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the
product or replace the product by another one.

CVSS Score:
5.8

CVSS Vector:
AV:A/AC:L/Au:N/C:P/I:P/A:P

CopyrightThis script is Copyright (C) 2011 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.