Opened 20 years ago
Closed 20 years ago
#1851 closed defect (bug) (fixed)
Cache exposes some user data
| Reported by: |
|
Owned by: | |
|---|---|---|---|
| Milestone: | Priority: | normal | |
| Severity: | critical | Version: | 1.6 |
| Component: | Administration | Keywords: | bg|has-patch |
| Focuses: | Cc: |
Description
Using the new cache system, some sensitive user data is easier to obtain than before.
Steps:
- Guess a WordPress username (like "admin").
- Obtain an MD5 hash of that username, call it XX.
- Access a file named http://example.com/wp-content/cache/users/{XX}
The data exposed contains the database record for that user. At least, it exposes the user's email address. At worst, this could be used to reverse-engineer cookies that would allow enough access to change the password of that user.
Attached patch uses the database password to seed the hashes, making the filenames that contain this data more difficult to guess.
Consider adding .htaccess to the cache directory to prevent direct access/prevent directory browsing? Consider hashing the cache directory names to prevent directory guessing? Consider not caching user data?
Attachments (1)
Change History (3)
Note: See
TracTickets for help on using
tickets.
Add a little salt.