Vulnerability CVE-2014-5347


Published: 2014-08-19

Description:
Multiple cross-site request forgery (CSRF) vulnerabilities in the Disqus Comment System plugin before 2.76 for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) disqus_replace, (2) disqus_public_key, or (3) disqus_secret_key parameter to wp-admin/edit-comments.php in manage.php or that (4) reset or (5) delete plugin options via the reset parameter to wp-admin/edit-comments.php.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Disqus 2.7.5 Cross Site Request Forgery / Cross Site Scripting
Nik
14.08.2014

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Disqus -> Disqus comment system 

 References:
http://packetstormsecurity.com/files/127847/WordPress-Disqus-2.7.5-CSRF-Cross-Site-Scripting.html
http://packetstormsecurity.com/files/127852/Disqus-2.7.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html
http://seclists.org/fulldisclosure/2014/Aug/35
http://www.exploit-db.com/exploits/34336
http://www.securityfocus.com/bid/69205
https://exchange.xforce.ibmcloud.com/vulnerabilities/95288
https://exchange.xforce.ibmcloud.com/vulnerabilities/95289
https://gist.github.com/nikcub/cb5dc7a5464276c8424a
https://wordpress.org/plugins/disqus-comment-system/other_notes
https://www.nikcub.com/posts/multiple-vulnerabilities-in-disqus-wordpress-plugin

Copyright 2024, cxsecurity.com

 

Back to Top