WP_Admin_UI in the Crony Cronjob Manager plugin before 0.4.7 for WordPress has CSRF via the name parameter in an action=manage&do=create operation, as demonstrated by inserting XSS sequences.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/crony/#developers | Third Party Advisory |
https://github.com/cybersecurityworks/Disclosed/issues/9 | Exploit Technical Description Third Party Advisory |
https://cybersecurityworks.com/zerodays/cve-2017-14530-crony.html | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-09-17 18:29
Updated : 2020-11-10 11:41
NVD link : CVE-2017-14530
Mitre link : CVE-2017-14530
JSON object : View
CWE
CWE-352
Cross-Site Request Forgery (CSRF)
Products Affected
crony_cronjob_manager_project
- crony_cronjob_manager