Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Sun, 17 Mar 2019 17:14:42 +0200
From: Henri Salo <henri@...v.fi>
To: oss-security@...ts.openwall.com
Subject: CVE-2019-9573 / CVE-2019-9574: WordPress plugin hrm missing server
 side authorization checks

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

I found several vulnerabilities from WordPress plugin hrm (WP Human Resource
Management) where server side authorization checks are missing. Plugin URL
https://wordpress.org/plugins/hrm/. Affected 2.2.5 and possibly below. Fixed in
2.2.6 according to developer who didn't respond to me, but communicated with
WordPress.

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9574

When creating new leave as admin user there is user picker visible in the UI.
Using same queries as picker functionality any logged in user (e.g.
Subscriber) can use search_emp_leave_records action to print all WordPress
users credentials from database.

{"success":true,"data":[{"ID":"1","user_login":"henri","user_pass":"$P$Bho3..

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9573

Any user can create new leave and can change status of leave (approving,
canceling etc).

Recommendation for developers:

Authorize users using a whitelist of roles allowed to call specific actions.
Define roles for all actions with secure default e.g. admin only. Ensure that
password hashes are not printed to any user. Function
https://codex.wordpress.org/Function_Reference/get_users could be used to list
the users.

Timeline:

2019-01-22: Report to developer and WordPress plugins team
2019-02-23: Fix released
2019-03-05: CVEs assigned by MITRE

- -- 
Henri Salo
-----BEGIN PGP SIGNATURE-----
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=Rnac
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.