Vulnerability CVE-2011-0759


Published: 2011-03-22   Modified: 2012-02-13

Description:
Multiple cross-site request forgery (CSRF) vulnerabilities in the configuration page in the Recaptcha (aka WP-reCAPTCHA) plugin 2.9.8.2 for WordPress allow remote attackers to hijack the authentication of administrators for requests that disable the CAPTCHA requirement or insert cross-site scripting (XSS) sequences via the (1) recaptcha_opt_pubkey, (2) recaptcha_opt_privkey, (3) re_tabindex, (4) error_blank, (5) error_incorrect, (6) mailhide_pub, (7) mailhide_priv, (8) mh_replace_link, or (9) mh_replace_title parameter.

Type:

CWE-352

(Cross-Site Request Forgery (CSRF))

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Blaenkdenum -> Wp-recaptcha 

 References:
http://xforce.iss.net/xforce/xfdb/66169
http://xforce.iss.net/xforce/xfdb/66167
http://www.securityfocus.com/bid/46909
http://secunia.com/advisories/43771
http://archives.neohapsis.com/archives/fulldisclosure/2011-03/0206.html

Copyright 2024, cxsecurity.com

 

Back to Top