Disqus WordPress plugin vulnerabilities
Posted on 14 August 2014.
During a penetration testing for a client, Australian based independent security consultant Nik Cubrilovic, discovered a couple of security issues within the very popular Disqus WordPress plugin. So far the plugin has been downloaded nearly 1.5 million times from the official Wordpress plugin repository.


The first issue is a cross-site request forgery in the Manage.php file. Cubrilovic notes that parameters disqus_replace, disqus_public_key and disqus_secret_key are being passed to WordPress’s update_option function directly without filtering. Exploiting this vulnerability requires crafting a malicious page and social engineering the administrator to click on it.

The second vulnerability is a bit less serious. Because of faulty checking, cross-site request forgery can be used to trigger the reset or delete functions of the Disqus comment system. This could result in deleted comments.

The final issue is related to the step parameter which is stored as unfiltered, and could be used in a cross site scripting attack.

These vulnerabilities have been patched in the latest version of Disqus - 2.7.6 released on June 24th. Because of his obvious responsible disclosure policy, Mr. Cubrilovic just released the details now, making sure enough time passed by since the release of the fixed Disqus Wordpress plugin.



Author: Berislav Kucan, Director of Operations at Help Net Security.





Spotlight

Why collaboration is crucial in the battle for IT security

Guy Wertheim, the CTO at Comilion, talks about the importance of collaboration and data sharing in the battle for increased security.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Tue, Sep 1st
    COPYRIGHT 1998-2015 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //