ID

VAR-201412-0128


CVE

CVE-2014-9339


TITLE

WordPress for SPNbabble Cross-site request forgery vulnerability in plugin

Trust: 0.8

sources: JVNDB: JVNDB-2014-007342

DESCRIPTION

Multiple cross-site request forgery (CSRF) vulnerabilities in the SPNbabble plugin 1.4.1 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) username or (2) password parameter in the spnbabble.php page to wp-admin/options-general.php. WordPress is a blogging platform developed using the PHP language. Users can set up their own blogs on servers that support PHP and MySQL databases. # Title: CSRF/XSS Vulnerability in SPNbabble WP Plugin # Author: Manideep K # CVE-ID: \xa0CVE-2014-9339 # Plugin Homepage: https://wordpress.org/plugins/spnbabble/ # Version Affected: 1.4.1 (probably lower versions) # Severity: High # About Plugin: SPNbabble (http://spnbabble.sitepronews.com) allows users to create an account and post 140 character blogs with urls to send out messages to your followers. Through the professional setup of SPNbabble you can also auto connect to Twitter, Friendfeed, Plurk, Tumblr, Facebook, Zannel, Youare, Meemi & Utterli. This plugin once installed allows you to enter your SPNbabble user and password and you can choose which blog posts will be converted into mini blogs. Your blog turned into several mini blogs on the most popular social media platforms is a great way to keep your message strong. # Description: # Vulnerable Parameter: username, password etc # About Vulnerability: This plugin is vulnerable to a combination of CSRF/XSS attack meaning that if an admin user can be tricked to visit a crafted URL created by attacker (via spear phishing/social engineering), the attacker can insert arbitrary script into admin page. Once exploited, admin\x92s browser can be made to do almost anything the admin user could typically do by hijacking admin's cookies etc. # Vulnerability Class: https://www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29 Cross Site Scripting (https://www.owasp.org/index.php/Top_10_2013-A3-Cross-Site_Scripting_(XSS)) # Steps to Reproduce: (POC): After installing the plugin You can use the following exploit code to exploit the vulnerability. For testing - you can just save it as .html and then get it clicked with an logged in administrator (by social engineering/spear phishing techniques) and see exploit in action Almost majority of the fields are vulnerable to CSRF + XSS attack <html> <body> <form action="http://localhost/wordpress/wp-admin/options-general.php?page=spnbabble.php" method="POST"> <input type="hidden" name="username" value="csrf testing" /> <input type="hidden" name="password" value="" /> <input type="hidden" name="blogname" value="" /> <input type="hidden" name="postprefix" value="New&#32;Blog&#32;Post&#58;" /> <input type="hidden" name="spn&#95;enable" value="Yes" /> <input type="hidden" name="spn&#95;update" value="Yes" /> <input type="hidden" name="info&#95;update" value="Update&#32;Options" /> <input type="submit" value="Submit request" /> </form> </body> </html> # Recommendations: a) Use proper input filtering techniques b) Use unique tokens such as nonces # Mitigation: Plugin Closed # Credits: Manideep K Information Security Researcher https://in.linkedin.com/in/manideepk

Trust: 2.25

sources: NVD: CVE-2014-9339 // JVNDB: JVNDB-2014-007342 // CNVD: CNVD-2014-09214 // PACKETSTORM: 129580

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-09214

AFFECTED PRODUCTS

vendor:jayde onlinemodel:spnbabblescope:eqversion:1.4.1

Trust: 1.6

vendor:jayde onlinemodel:spnbabblescope:lteversion:1.4.1

Trust: 0.8

vendor:wordpressmodel:spnbabble pluginscope:lteversion:<=1.4.1

Trust: 0.6

sources: CNVD: CNVD-2014-09214 // JVNDB: JVNDB-2014-007342 // CNNVD: CNNVD-201412-441 // NVD: CVE-2014-9339

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-9339
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-9339
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2014-09214
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201412-441
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2014-9339
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-09214
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2014-09214 // JVNDB: JVNDB-2014-007342 // CNNVD: CNNVD-201412-441 // NVD: CVE-2014-9339

PROBLEMTYPE DATA

problemtype:CWE-352

Trust: 1.8

sources: JVNDB: JVNDB-2014-007342 // NVD: CVE-2014-9339

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201412-441

TYPE

cross-site request forgery

Trust: 0.6

sources: CNNVD: CNNVD-201412-441

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-007342

PATCH

title:Top Pageurl:http://spnbabble.sitepronews.com/

Trust: 0.8

sources: JVNDB: JVNDB-2014-007342

EXTERNAL IDS

db:NVDid:CVE-2014-9339

Trust: 3.1

db:PACKETSTORMid:129580

Trust: 3.1

db:JVNDBid:JVNDB-2014-007342

Trust: 0.8

db:CNVDid:CNVD-2014-09214

Trust: 0.6

db:CNNVDid:CNNVD-201412-441

Trust: 0.6

sources: CNVD: CNVD-2014-09214 // JVNDB: JVNDB-2014-007342 // PACKETSTORM: 129580 // CNNVD: CNNVD-201412-441 // NVD: CVE-2014-9339

REFERENCES

url:http://packetstormsecurity.com/files/129580/wordpress-spnbabble-1.4.1-csrf-xss.html

Trust: 3.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-9339

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-9339

Trust: 0.8

url:https://www.owasp.org/index.php/top_10_2013-a3-cross-site_scripting_(xss))

Trust: 0.1

url:https://in.linkedin.com/in/manideepk

Trust: 0.1

url:https://www.owasp.org/index.php/cross-site_request_forgery_%28csrf%29

Trust: 0.1

url:http://localhost/wordpress/wp-admin/options-general.php?page=spnbabble.php"

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2014-9339

Trust: 0.1

url:http://spnbabble.sitepronews.com)

Trust: 0.1

url:https://wordpress.org/plugins/spnbabble/

Trust: 0.1

sources: CNVD: CNVD-2014-09214 // JVNDB: JVNDB-2014-007342 // PACKETSTORM: 129580 // CNNVD: CNNVD-201412-441 // NVD: CVE-2014-9339

CREDITS

Manideep K

Trust: 0.1

sources: PACKETSTORM: 129580

SOURCES

db:CNVDid:CNVD-2014-09214
db:JVNDBid:JVNDB-2014-007342
db:PACKETSTORMid:129580
db:CNNVDid:CNNVD-201412-441
db:NVDid:CVE-2014-9339

LAST UPDATE DATE

2025-04-12T23:13:12.034000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-09214date:2014-12-30T00:00:00
db:JVNDBid:JVNDB-2014-007342date:2014-12-24T00:00:00
db:CNNVDid:CNNVD-201412-441date:2014-12-22T00:00:00
db:NVDid:CVE-2014-9339date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-09214date:2014-12-30T00:00:00
db:JVNDBid:JVNDB-2014-007342date:2014-12-24T00:00:00
db:PACKETSTORMid:129580date:2014-12-14T14:32:22
db:CNNVDid:CNNVD-201412-441date:2014-12-22T00:00:00
db:NVDid:CVE-2014-9339date:2014-12-19T15:59:22.753