[Full-disclosure] CSRF in WordPress plugin Google Analytics MU 2.3

2014-03-03 Thread Harry Metcalfe

Details

Software: Google Analytics MU
Version: 2.3
Homepage: http://wordpress.org/plugins/google-analytics-mu/
CVSS: 5.8 (Medium; AV:N/AC:M/Au:N/C:P/I:P/A:N)

Description

CSRF in Google Analytics MU 2.3

Vulnerability

If an admin visits a page of the attacker’s choosing then the plugin’s 
settings can be altered. This could cause a mild disruption by breaking 
analytics until the problem is noticed, or if the attacker substitutes 
an analytics code they own they could gain access to the analytics data 
until the organisation notices the problem.
There should be a nonce check around line 71 of google-analytics-mu.php 
and a nonce around line 86.


Proof of concept

A simple form which changes the analytics code to “abc”:
form method=POST 
action=http://localhost/wp-admin/network/settings.php?page=google-analytics-mu-network;

input type=text name=UAIDsuper value=abc
input type=submit
/form

Mitigations

Update to version 2.4 or greater.

Timeline


2014-02-19: Discovered
2014-02-26: Reported
2014-02-27: Vendor reports fixed

Discovered by:

Tom Adams

Disclosure policy

dxw believes in responsible disclosure. Your attention is drawn to our 
disclosure policy: https://security.dxw.com/disclosure/



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] CVE-2014-2238 -- MantisBT aux mod

2014-03-03 Thread Brandon Perry
Hi,

Here is an aux mod that exploits CVE-2014-2238 and reads a file off the FS.

Requires admin creds afaict.

https://gist.github.com/brandonprry/9330240

-- 
http://volatile-minds.blogspot.com -- blog
http://www.volatileminds.net -- website
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/