Vulnerability Details : CVE-2009-2336
The forgotten mail interface in WordPress and WordPress MU before 2.8.1 exhibits different behavior for a password request depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience."
Threat overview for CVE-2009-2336
Top countries where our scanners detected CVE-2009-2336
Top open port discovered on systems with this issue
80
IPs affected by CVE-2009-2336 2
Find out if you* are
affected by CVE-2009-2336!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2009-2336
Probability of exploitation activity in the next 30 days: 0.66%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 77 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2009-2336
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2009-2336
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-2336
-
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html
Third Party Advisory
-
http://www.exploit-db.com/exploits/9110
Third Party Advisory;VDB Entry
-
http://securitytracker.com/id?1022528
Patch;Third Party Advisory;VDB Entry
-
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html
Third Party Advisory
-
http://www.securityfocus.com/bid/35581
WordPress Multiple Existing/Non-Existing Username Enumeration WeaknessesThird Party Advisory;VDB Entry
-
https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html
Third Party Advisory
-
http://www.securityfocus.com/archive/1/504795/100/0/threaded
Third Party Advisory;VDB Entry
-
http://corelabs.coresecurity.com/index.php?action=view&type=advisory&name=WordPress_Privileges_Unchecked
Exploit;Patch;Third Party Advisory
-
http://www.vupen.com/english/advisories/2009/1833
Patch;Third Party Advisory
-
https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html
Third Party Advisory
Products affected by CVE-2009-2336
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*