Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAHmME9rzmkJNNF+bADWzfNYEDoY8jpsJNPFb4YW6r7N9ecjrGg@mail.gmail.com>
Date: Fri, 28 Dec 2012 09:04:49 +0100
From: "Jason A. Donenfeld" <Jason@...c4.com>
To: oss-security <oss-security@...ts.openwall.com>
Cc: Frederick Townes <ftownes@...edge.com>
Subject: CVE Request: W3 Total Cache - public cache exposure

Hi Kurt,

W3 Total Cache: http://wordpress.org/extend/plugins/w3-total-cache/

CVE request for three separate issues:

1. Cache allows directory listing of hash-key listings, exposing hash keys.

2. Hash keys are easily predictable, in the case of (1) not existing.

3. Cached database values are downloadable by their hash keys on the public
internet, exposing sensitive information like password hashes.

Fixing (3) mitigates (1) and (2), so assign this either three CVEs or one
CVE.

Source: http://seclists.org/fulldisclosure/2012/Dec/242

The vendor, copied on this email, currently has not issued a fix.

Thanks,
Jason

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.