
CVE-2019-6703 Scanner
CVE-2019-6703 Scanner - Arbitrary Options Update vulnerability in Total Donations Plugin for WordPress
Short Info
Level
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
11 days 12 hours
Scan only one
Domain, Subdomain, IPv4
Toolbox
-
The Total Donations Plugin for WordPress is widely used by developers and website administrators to facilitate donations on WordPress websites. Created by Calmar Webmedia, it helps users manage fundraising efforts seamlessly on their platforms. This plugin can be integrated into any WordPress site to leverage its robust features for tracking donations, managing donors, and generating reports. Utilized by various organizations worldwide, it ensures a user-friendly interface for managing donation processes effectively. However, like any software, it requires regular updates to fix vulnerabilities and enhance its security features. It's crucial for users to be aware of and address potential vulnerabilities to maintain site integrity.
The Arbitrary Options Update vulnerability within the Total Donations Plugin for WordPress allows unauthenticated attackers to update arbitrary WordPress option values. By exploiting this vulnerability, attackers can potentially take over a WordPress site by modifying sensitive configurations. The vulnerability lies in an incorrect access control mechanism within the plugin, specifically in the migla_ajax_functions.php file. Attackers can send unauthorized requests, which can affect the site's critical settings. This vulnerability is particularly severe due to its potential impact if exploited, leading to unauthorized access and control over important site functionalities.
Technically, the vulnerability is found in the migla_ajax_functions.php file, which lacks the necessary access control measures. Attackers can exploit it by sending crafted requests to wp-admin/admin-ajax.php, calling the miglaA_update_me action. This action allows attackers to change arbitrary option values on an infected site. Specifically, they can enable new user registration and assign the default role of new users to an administrator. By executing this exploitation, attackers gain administrative privileges, significantly compromising the site's security and functionality. Additional permissions can lead to further exploits and disruptions.
If exploited by malicious individuals, this vulnerability could allow unauthorized attackers to gain control over a WordPress site. Attackers can modify crucial site options, such as enabling new user registrations and setting administrative roles for newcomers. Consequently, attackers could take over the site, leading to unauthorized access, data manipulation, and potential data breaches. The exploit undermines the integrity and confidentiality of the site, potentially leading to loss of user trust and reputation damage. It's crucial for site administrators to apply necessary patches or updates to prevent such adverse outcomes.
REFERENCES