Cross-site request forgery (CSRF) vulnerability in wp-admin/index.php in WordPress 3.4.2 allows remote attackers to hijack the authentication of administrators for requests that modify an RSS URL via a dashboard_incoming_links edit action.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://bugs.gentoo.org/show_bug.cgi?id=436198 | vendor advisory |
http://secunia.com/advisories/50715 | third party advisory vendor advisory |
http://packetstormsecurity.org/files/116785/WordPress-3.4.2-Cross-Site-Request-Forgery.html | exploit |
http://openwall.com/lists/oss-security/2012/09/25/15 | mailing list |
https://bugzilla.redhat.com/show_bug.cgi?id=860261 |