Lucene search

K
wpvulndbAlex SanfordWPVDB-ID:1B36A184-2138-4A65-8940-07E7764669BB
HistoryMay 02, 2023 - 12:00 a.m.

Orbit Fox < 2.10.24 - Author+ Server-Side Request Forgery

2023-05-0200:00:00
Alex Sanford
wpscan.com
4
orbit fox
server-side request forgery
vulnerability
stock photo import
arbitrary urls
http requests

0.001 Low

EPSS

Percentile

23.7%

The plugin does not limit URLs which may be used for the stock photo import feature, allowing the user to specify arbitrary URLs. This leads to a server-side request forgery as the user may force the server to access any URL of their choosing.

PoC

1. Install the Log HTTP Requests plugin to inspect the requests being sent from the server-side. 2. Open a blog post in the block editor. 3. Click on the “MyStockPhotos” icon in the upper right to open the “MyStockPhotos” sidebar. 4. Hover over an image, click the button to “Add to Media Library”, and intercept the request. 5. Change the URL in the url POST parameter to an arbitrary URL. 6. Forward the request, and check the HTTP Requests log. See that the server has sent a request to the URL that was chosen.

CPENameOperatorVersion
themeisle-companionlt2.10.24

0.001 Low

EPSS

Percentile

23.7%

Related for WPVDB-ID:1B36A184-2138-4A65-8940-07E7764669BB