Vigil@nce - WordPress: Cross Site Request Forgery of Mail On Update
June 2013 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can trigger a Cross Site Request Forgery in Mail On
Update of WordPress, in order to force the victim to perform
operations.
Impacted products: WordPress
Severity: 2/4
Creation date: 16/05/2013
DESCRIPTION OF THE VULNERABILITY
The Mail On Update plugin sends an email when a page is updated.
However, the origin of queries is not checked. They can for
example originate from an image included in an HTML document.
An attacker can therefore trigger a Cross Site Request Forgery in
Mail On Update of WordPress, in order to force the victim to
perform operations.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/WordPress-Cross-Site-Request-Forgery-of-Mail-On-Update-12839