#VU14716 Cross-site request forgery in Z-BlogPHP


Published: 2018-09-08

Vulnerability identifier: #VU14716

Vulnerability risk: Medium

CVSSv3.1: 5.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C]

CVE-ID: CVE-2018-8893

CWE-ID: CWE-352

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Z-BlogPHP
Web applications / Forum & blogging software

Vendor: Z-Blogcn

Description

The vulnerability allows a remote attacker to perform CSRF attacks.

The vulnerability exists due to improper handling of the HTTP request origin in plugin_edit.php. A remote attacker can trick the victim into visiting a specially specially crafted web page that may result in the ability to execute arbitrary PHP code.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Z-BlogPHP: 1.5.1


External links
http://www.secz.org/0day/2569.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.


Latest bulletins with this vulnerability