Cross-site request forgery (CSRF) vulnerability in the FeedBurner FeedSmith 2.2 plugin for WordPress allows remote attackers to change settings and hijack blog feeds via a request to wp-admin/options-general.php that submits parameter values to FeedBurner_FeedSmith_Plugin.php, as demonstrated by the (1) feedburner_url and (2) feedburner_comments_url parameters.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://marc.info/?l=full-disclosure&m=119145344606493&w=2 | mailing list exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/36940 | vdb entry |
http://secunia.com/advisories/27055 | third party advisory patch vendor advisory |
https://www.exploit-db.com/exploits/30637/ | exploit |
http://blogsecurity.net/wordpress/feedburner-feed-hijacking/ | exploit |
http://www.securityfocus.com/bid/25921 | vdb entry |
http://blogsecurity.net/wordpress/feedsmith-feedburner-vulnerability-fixed/ | |
http://blogs.feedburner.com/feedburner/archives/2007/10/the_feedsmith_plugin_newly_for.php |