Headline
CVE-2017-20090: Cross-Site Request Forgery in Global Content Blocks WordPress Plugin
A vulnerability was found in Global Content Blocks Plugin 2.1.5. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely.
Nmap Announce Nmap Dev Full Disclosure Security Lists Internet Issues Open Source Dev
Bugtraq mailing list archives
From: Summer of Pwnage <lists () securify nl>
Date: Wed, 1 Mar 2017 07:04:00 +0100
------------------------------------------------------------------------ Cross-Site Request Forgery in Global Content Blocks WordPress Plugin
Yorick Koster, July 2016
Abstract
It was discovered that the Global Content Blocks WordPress Plugin is vulnerable to Cross-Site Request Forgery. Amongst others, this issue can be used to update a content block to overwrite it with arbitrary PHP code. Visiting a page or blog post that uses this content block will cause the attacker’s PHP code to be executed.
OVE ID
OVE-20160712-0031
Tested versions
This issue was successfully tested on Global Content Blocks WordPress Plugin version 2.1.5.
Fix
There is currently no fix available.
Details
https://sumofpwn.nl/advisory/2016/cross_site_request_forgery_in_global_content_blocks_wordpress_plugin.html
Summer of Pwnage (https://sumofpwn.nl) is a Dutch community project. Its goal is to contribute to the security of popular, widely used OSS projects in a fun and educational way.
Current thread:
- Cross-Site Request Forgery in Global Content Blocks WordPress Plugin Summer of Pwnage (Mar 01)