A Cross-Site Request Forgery vulnerability was found in the Icegram WordPress Plugin. This issue allows an attacker to overwrite any WordPress option with the value true. An attacker may use this issue to enable (vulnerable) WordPress features that are disabled in the target site.
For feedback or questions about this advisory mail us at sumofpwn at securify.nl
This issue has been found during the Summer of Pwnage hacker event, running from July 1-29. A community summer event in which a large group of security bughunters (worldwide) collaborate in a month of security research on Open Source Software (WordPress this time). For fun. The event is hosted by Securify in Amsterdam.
This issue was successfully tested on the Icegram - Popups, Optins, CTAs & lot more... WordPress Plugin version 1.9.18.
This issue is resolved in Icegram 1.9.19.
The Icegram WordPress Plugin allows creating beautiful popups, hellobars, slide-ins & notifications. Capture leads, Instant results and awesome support. A Cross-Site Reqeust Forgery vulnerability exists in Icegram that allows an attacker to overwrite any WordPress option with the value true. An attacker may use this issue to enable (vulnerable) WordPress features that are disabled in the target site.
The vulnerability exists in the file icegram.php. As can be seen in the code fragment below, the plugin reads the value of the option_name URL parameter and uses this value as a key to update_option(). This allows an attacker to create an link that will overwrite an arbitrary WordPress option. The value of target option will be set to true.
In order to exploit this issue, the attacker has to lure/force a logged on WordPress Administrator into opening a malicious link. If a logged in Administrator opens the following URL, the ability for users to register will be enabled: