WordPress Real-Time Find and Replace Plugin < 4.0.2 CSRF Vulnerability

2020-05-29T00:00:00
ID OPENVAS:1361412562310113695
Type openvas
Reporter Copyright (C) 2020 Greenbone Networks GmbH
Modified 2020-05-29T00:00:00

Description

The WordPress plugin Real-Time Find and Replace is prone to a cross-site request forgery (CSRF) vulnerability.

                                        
                                            # Copyright (C) 2020 Greenbone Networks GmbH
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-or-later
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License
# as published by the Free Software Foundation; either version 2
# of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program; if not, write to the Free Software
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.113695");
  script_version("2020-05-29T09:49:24+0000");
  script_tag(name:"last_modification", value:"2020-05-29 09:49:24 +0000 (Fri, 29 May 2020)");
  script_tag(name:"creation_date", value:"2020-05-29 09:13:17 +0000 (Fri, 29 May 2020)");
  script_tag(name:"cvss_base", value:"6.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:P");

  script_tag(name:"qod_type", value:"remote_banner");

  script_tag(name:"solution_type", value:"VendorFix");

  script_cve_id("CVE-2020-13641");

  script_name("WordPress Real-Time Find and Replace Plugin < 4.0.2 CSRF Vulnerability");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2020 Greenbone Networks GmbH");
  script_family("Web application abuses");
  script_dependencies("gb_wordpress_plugin_http_detect.nasl");
  script_mandatory_keys("real-time-find-and-replace/detected");

  script_tag(name:"summary", value:"The WordPress plugin Real-Time Find and Replace is prone to
  a cross-site request forgery (CSRF) vulnerability.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"The far_options_page function does not do any nonce verification,
  allowing for requests to be forged on behalf of an administrator. The find and replace rules
  could be updated with malicious JavaScript, allowing for that be executed later in the victims browser.");

  script_tag(name:"impact", value:"Successful exploitation would allow an attacker to
  perform actions in the context of an administrator.");

  script_tag(name:"affected", value:"WordPress Real-Time Find and Replace plugin through version 4.0.1.");

  script_tag(name:"solution", value:"Update to version 4.0.2.");

  script_xref(name:"URL", value:"https://www.wordfence.com/blog/2020/04/high-severity-vulnerability-patched-in-real-time-find-and-replace-plugin/");
  script_xref(name:"URL", value:"https://wordpress.org/plugins/real-time-find-and-replace/#developers");

  exit(0);
}

CPE = "cpe:/a:infolific:real-time-find-and-replace";

include( "host_details.inc" );
include( "version_func.inc" );

if( ! port = get_app_port( cpe: CPE ) ) exit( 0 );
if( ! infos = get_app_version_and_location( cpe: CPE, port: port, exit_no_version: TRUE ) ) exit( 0 );

version = infos["version"];
location = infos["location"];

if( version_is_less( version: version, test_version: "4.0.2" ) ) {
  report = report_fixed_ver( installed_version: version, fixed_version: "4.0.2", install_path: location );
  security_message( data: report, port: port );
  exit( 0 );
}

exit( 99 );