Vulnerability Description
wp-includes/class-phpass.php in WordPress 3.5.1, when a password-protected post exists, allows remote attackers to cause a denial of service (CPU consumption) via a crafted value of a certain wp-postpass cookie.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | 3.5.1 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/bugtraq/2013-06/0052.html
- http://codex.wordpress.org/Version_3.5.2
- http://openwall.com/lists/oss-security/2013/06/12/2
- http://wordpress.org/news/2013/06/wordpress-3-5-2/
- http://www.debian.org/security/2013/dsa-2718
- https://github.com/wpscanteam/wpscan/issues/219
- https://vndh.net/note:wordpress-351-denial-serviceExploit
- http://archives.neohapsis.com/archives/bugtraq/2013-06/0052.html
- http://codex.wordpress.org/Version_3.5.2
- http://openwall.com/lists/oss-security/2013/06/12/2
- http://wordpress.org/news/2013/06/wordpress-3-5-2/
- http://www.debian.org/security/2013/dsa-2718
- https://github.com/wpscanteam/wpscan/issues/219
- https://vndh.net/note:wordpress-351-denial-serviceExploit
FAQ
What is CVE-2013-2173?
CVE-2013-2173 is a vulnerability with a CVSS score of 4.3 (MEDIUM). wp-includes/class-phpass.php in WordPress 3.5.1, when a password-protected post exists, allows remote attackers to cause a denial of service (CPU consumption) via a crafted value of a certain wp-postp...
How severe is CVE-2013-2173?
CVE-2013-2173 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-2173?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress.