The Blackhole for Bad Bots WordPress plugin before 3.3.2 uses headers such as CF-CONNECTING-IP, CLIENT-IP etc to determine the IP address of requests hitting the blackhole URL, which allows them to be spoofed. This could result in blocking arbitrary IP addresses, such as legitimate/good search engine crawlers / bots. This could also be abused by competitors to cause damage related to visibility in search engines, can be used to bypass arbitrary blocks caused by this plugin, block any visitor or even the administrator and even more.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/2666486 | Patch Third Party Advisory |
https://wpscan.com/vulnerability/10d85913-ea8c-4c2e-a32e-fa61cf191710 | Exploit Third Party Advisory |
https://plugins.trac.wordpress.org/changeset/2666486 | Patch Third Party Advisory |
https://wpscan.com/vulnerability/10d85913-ea8c-4c2e-a32e-fa61cf191710 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 06:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/changeset/2666486 - Patch, Third Party Advisory | |
References | () https://wpscan.com/vulnerability/10d85913-ea8c-4c2e-a32e-fa61cf191710 - Exploit, Third Party Advisory |
Information
Published : 2022-04-04 16:15
Updated : 2024-11-21 06:40
NVD link : CVE-2022-1165
Mitre link : CVE-2022-1165
CVE.ORG link : CVE-2022-1165
JSON object : View
Products Affected
plugin-planet
- blackhole_for_bad_bots
CWE
CWE-639
Authorization Bypass Through User-Controlled Key