Vigil@nce - WordPress Users to CSV: Cross Site Request Forgery
August 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can trigger a Cross Site Request Forgery of WordPress
Users to CSV, in order to force the victim to perform operations,
and notably retrieve the content of the user account database.
Impacted products: WordPress Plugins not comprehensive.
Severity: 2/4.
Creation date: 16/06/2015.
DESCRIPTION OF THE VULNERABILITY
The Users to CSV plugin can be installed on WordPress.
However, the origin of queries is not checked. They can for
example originate from an image included in an HTML document.
An attacker can therefore trigger a Cross Site Request Forgery of
WordPress Users to CSV, in order to force the victim to perform
operations, and notably retrieve the content of the user account
database.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/WordPress-Users-to-CSV-Cross-Site-Request-Forgery-17145