Cross-site request forgery in One Click SSL - #VU19209

 

Cross-site request forgery in One Click SSL - #VU19209

Published: July 17, 2019


Vulnerability identifier: #VU19209
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: N/A
CWE-ID: CWE-352
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Tribulant Software
Affected software:
One Click SSL

Detailed vulnerability description

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to the lack of CSRF and authorisation checks in the settings page, as well as "ajax_enable_ssl()", "ajax_scan()" AJAX methods. A remote attacker can trick the victim to visit a specially crafted web page and perform settings change on the affected system.

This vulnerability also allows a call of the AJAX methods by a low privileged user and arbitrary site options update due to the way the update_option() and update_site_option() are used in the admin() and admin_network() functions.

Remediation

Install updates from vendor's website.

Sources