Mashshare 2.3.0, Information Disclosure
The Mashshare plugin exposes a few AJAX commands via its own custom hook, which can be found in the file ‘includes/admin/admin-actions.php’, and the function ‘mashsb_process_actions’. This function is called upon the ‘admin_init’ action being fired, which can be triggered by anyone when visiting the admin AJAX handler. Coupled with the fact that there is no checking of user privilege on this function means that anonymous users are able to trigger certain functions intended for Administrative use only.
Homepage
https://wordpress.org/plugins/mashsharer/
CVSS Score
5
CSSS Vector
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Attack Scope
remote
Authorization Required
None
Mitigation
Update to version 2.3.1
Proof of Concept
Visiting the following URL on the target will disclose the content that is usually displayed in the ‘System Info’ tab, under the Administration panel, which includes PHP version, Plugins installed, and various other System information.
http://localhost/wp-admin/admin-ajax.php?action=-&mashsb-action=tools_tab_system_info
Timeline
- 2015-04-14: Discovered
- 2015-04-14: Vendor notified
- 2015-04-14: Vendor responded with intent to fix
- 2015-04-17: Version 2.3.1 released – issue resolved
- 2015-04-25: Advisory released