Cross-site request forgery (CSRF) vulnerability in Cart66Product.php in the Cart66 Lite plugin before 1.5.1.15 for WordPress allows remote attackers to hijack the authentication of administrators for requests that (1) create or modify products or conduct cross-site scripting (XSS) attacks via the (2) Product name or (3) Price description field in a product save action via a request to wp-admin/admin.php.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/bugtraq/2013-10/0048.html | mailing list exploit |
http://www.exploit-db.com/exploits/28959 | exploit |
http://osvdb.org/98352 | vdb entry |
http://seclists.org/bugtraq/2013/Oct/52 | mailing list exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/87874 | vdb entry |
http://secunia.com/advisories/55265 | third party advisory vendor advisory |
http://wordpress.org/plugins/cart66-lite/changelog/ | |
http://blog.noobroot.com/#%21/2013/10/0-day-wordpress-cart66-plugin-15114.html | |
http://www.securityfocus.com/bid/62975 | vdb entry |
http://packetstormsecurity.com/files/123587/WordPress-Cart66-1.5.1.14-Cross-Site-Request-Forgery-Cross-Site-Scripting.html | exploit |