Bug 471989 (CVE-2008-5113)

Summary: CVE-2008-5113 wordpress delayed attack via cookies
Product: [Other] Security Response Reporter: Josh Bressers <bressers>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED UPSTREAM QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: adrian, bretm, collab-tools-list, john, vdanen
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
URL: http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5113
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2010-12-24 02:13:00 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 471990, 471991, 471992    
Bug Blocks:    

Description Josh Bressers 2008-11-18 01:47:16 UTC
WordPress 2.6.3 relies on the REQUEST superglobal array in certain
dangerous situations, which makes it easier for remote attackers to
conduct delayed and persistent cross-site request forgery (CSRF)
attacks via crafted cookies, as demonstrated by attacks that (1)
delete user accounts or (2) cause a denial of service (loss of
application access). NOTE: this issue relies on the presence of an
independent vulnerability that allows cookie injection.

http://openwall.com/lists/oss-security/2008/11/14/1
http://bugs.debian.org/504771

Comment 1 Josh Bressers 2008-11-18 01:47:48 UTC
Created wordpress tracking bugs for this issue

CVE-2008-5113 Affects: F8 [bug #471990]
CVE-2008-5113 Affects: F9 [bug #471991]
CVE-2008-5113 Affects: Fdevel [bug #471992]

Comment 3 Adrian Reber 2008-11-25 18:40:12 UTC
2.6.5 is available which seems to fix the security vulnerability

http://wordpress.org/development/2008/11/wordpress-265/

They do not mention the CVE number as far as I see it but the changes to feed.php
seems to change the behaviour concerning the REQUEST variable:

http://trac.wordpress.org/changeset?old_path=tags%2F2.6.3&old=&new_path=tags%2F2.6.5&new=#file2

I will push updates for wordpress.

Comment 4 Tomas Hoger 2008-11-26 08:57:45 UTC
From this quick look at the 2.6.3 -> 2.6.5 changeset, I fail to see any change that may be possibly related to this issue.  $_REQUEST still seems widely used in 2.6.5, feed.php is unlikely to be the only place to be affected.  Please do not mention this bug/CVE in the 2.6.5 update request.

Comment 5 Vincent Danen 2010-12-24 02:13:00 UTC
According to http://codex.wordpress.org/CVEs#2008 this only affected 2.6.3.