Vigil@nce - WordPress Disqus Comment System: Cross Site Request Forgery
September 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can trigger Cross Site Request Forgeries of WordPress
Disqus Comment System, in order to force the victim to perform
operations.
– Impacted products: WordPress Plugins
– Severity: 2/4
– Creation date: 20/08/2014
DESCRIPTION OF THE VULNERABILITY
The Disqus Comment System plugin can be installed on WordPress.
However, the sequencing of requests is not rightly checked, nonces
are not checked wherever they must be. Requests can for example
originate from an image included in an HTML document.
An attacker can therefore trigger a Cross Site Request Forgery of
WordPress Disqus Comment System, in order to force the victim to
perform operations.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/WordPress-Disqus-Comment-System-Cross-Site-Request-Forgery-15207