Vulnerability CVE-2014-2598


Published: 2015-01-05

Description:
Cross-site request forgery (CSRF) vulnerability in the Quick Page/Post Redirect plugin before 5.0.5 for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the quickppr_redirects[request][] parameter in the redirect-updates page to wp-admin/admin.php.

Type:

CWE-352

(Cross-Site Request Forgery (CSRF))

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Quick page/post redirect project -> Quick page/post redirect 

 References:
https://wordpress.org/plugins/quick-pagepost-redirect-plugin/changelog/
https://security.dxw.com/advisories/csrf-and-stored-xss-in-quick-pagepost-redirect-plugin/
http://xforce.iss.net/xforce/xfdb/92528
http://www.exploit-db.com/exploits/32867
http://secunia.com/advisories/57883
http://seclists.org/fulldisclosure/2014/Apr/171
http://packetstormsecurity.com/files/126127
http://osvdb.org/show/osvdb/105708
http://osvdb.org/show/osvdb/105707

Copyright 2024, cxsecurity.com

 

Back to Top