fkie_cve-2008-3747
Vulnerability from fkie_nvd
Published
2008-08-27 15:21
Modified
2025-04-09 00:30
Severity ?
Summary
The (1) get_edit_post_link and (2) get_edit_comment_link functions in wp-includes/link-template.php in WordPress before 2.6.1 do not force SSL communication in the intended situations, which might allow remote attackers to gain administrative access by sniffing the network for a cookie.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4FEB898B-BF80-44C1-A847-AC0062458B58", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "7E70EF48-AD6C-4119-B7C4-67E889A2BB27", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "0395AD1D-3470-49EE-9F2A-349EF8782B40", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*", "matchCriteriaId": "9C8B90E9-5DF5-45F5-9810-2973FDAA16A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:0.72:*:*:*:*:*:*:*", "matchCriteriaId": "5F33ACD9-B4B6-4B5E-9CD5-26AA5997119C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:0.72:beta1:*:*:*:*:*:*", "matchCriteriaId": "056E641C-9322-4BEE-97B4-FE16DE8D7336", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:0.72:beta2:*:*:*:*:*:*", "matchCriteriaId": "ADB42CEF-E12D-4DB0-8536-FD393D3697A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:0.72:rc1:*:*:*:*:*:*", "matchCriteriaId": "C4AF89F9-AE67-49B5-ACF0-3A645C454E84", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:*", "matchCriteriaId": "0174AF4F-9759-4762-ACF4-688E232AF1EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7D86BA1-3DC8-478C-B2FA-581F9AE1F93E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6E7BEFBD-4326-44A5-A160-9406D94AB307", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF1FE320-DF71-42EC-A0F0-300F7D6D4AB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.2:beta:*:*:*:*:*:*", "matchCriteriaId": "0666BEBE-BE45-41D3-8C53-E4C9E6853C1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B64D4777-2ED6-4A47-A8F3-38A3A8EB1ACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "614956CB-0582-4EAD-86F4-5AB0BB781CE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "503E4894-3F39-471F-9A56-052718813BF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F0B6EAC-E43D-4D1B-856F-7C23250A2355", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "51FAD0FC-CE84-4332-B061-75C0C8A0B6AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDCFE9AA-39E9-4366-AAB7-F7A891BC797E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BAF4671A-8449-438E-922B-94E5542137BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "92F05A1F-2227-4166-807B-1BDE2EA8F245", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "EECE66B3-3696-4E98-AF63-DF2FB256A6FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E75BB382-6B47-4C6A-BF94-80443BEB1A23", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFA75368-506F-4772-B0F2-8AAECDF288F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FDDD9E5C-766F-4945-B87D-781E780AB03E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "E6AAA17D-FBB8-4F54-82E2-870D6FA5C299", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "B2A0CAEE-5C14-44C6-85FB-6AFDAAA1C3F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "66BE667A-A937-4C38-B4D5-29B33F23F7B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8A3624D4-E666-4A1B-B465-714ACBA0034C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A7CBC45-320E-48CF-9A63-07DDE2FB61BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "266E32CD-66FB-4E19-8091-EC748B177D8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3DD9120-2224-4612-A6EE-539F47BD50E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "5A9FBA02-8A6A-471F-92CD-D8E77B5061C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1B5BC7E8-4C8A-4183-AB8C-1DAE12935387", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A0F9137B-D13F-488B-8196-85E06FAB682E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "82F257F4-CB62-4C6F-8866-AA253EC8C0C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "79AB6F6F-2FE3-4FC3-9009-D40EA852711F", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.3:beta3:*:*:*:*:*:*", "matchCriteriaId": "94ADC624-E43E-4F1D-8525-F6903943C932", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.3:rc1:*:*:*:*:*:*", "matchCriteriaId": "06A25444-2680-4379-B2CA-9858B6AF71CE", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A82F4D88-779D-4D5D-96CD-2B31B61BA29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.1:rc1:*:*:*:*:*:*", "matchCriteriaId": "4801D56C-5ED6-4648-A0C9-EB4D06786A55", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA0DABD9-DE15-4619-8668-0277A67F5205", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "40BEC573-A346-4F07-8053-A5F6E92A343C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "2A777651-D2B2-47E0-A13C-BD667635F3E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "B017F95A-90F8-4DE4-B74F-ABB712F32987", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The (1) get_edit_post_link and (2) get_edit_comment_link functions in wp-includes/link-template.php in WordPress before 2.6.1 do not force SSL communication in the intended situations, which might allow remote attackers to gain administrative access by sniffing the network for a cookie." }, { "lang": "es", "value": "Las funciones (1) get_edit_post_link y (2) get_edit_comment_link en wp-includes/link-template.php de WordPress antes de 2.6.1 no fuerzan comunicaci\u00f3n SSL en las situaciones previstas, lo que podr\u00eda permitir a atacantes remotos obtener acceso administrativo siguiendo la red para una cookie." } ], "id": "CVE-2008-3747", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-08-27T15:21:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://trac.wordpress.org/ticket/7359" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2008/08/19/1" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2008/08/20/3" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/30750" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44569" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://trac.wordpress.org/ticket/7359" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/08/19/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/08/20/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/30750" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44569" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…