lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 10 Apr 2018 14:11:46 +0000
From: dxw Security <>
Subject: [FD] WP Image Zoom allows anybody to cause denial of service
	(WordPress plugin)

Software: WP Image Zoom
Version: 1.23
Advisory report:
CVE: Awaiting assignment
CVSS: 7.5 (High; AV:N/AC:L/Au:S/C:N/I:P/A:C)

WP Image Zoom allows anybody to cause denial of service

WP Image Zoom includes an AJAX action which allows any logged in user to set any option to “1”. This means that any logged in user can cause a denial of service for all WP URLs by setting the “template” option to “1”.
Additionally, this vulnerability can be triggered via CSRF meaning that anybody who can convince a logged in user to follow a link can also cause a denial of service.

Proof of concept
Press the submit button in the following HTML snippet:
<form action=\"http://localhost/wp-admin/admin-ajax.php\" method=\"POST\">
 <input type=\"text\" name=\"action\" value=\"iz_dismiss\">
 <input type=\"text\" name=\"option\" value=\"template\">
 <input type=\"submit\">
This will set the template option to 1 causing fatal errors for any WordPress URL.
In a real attack the form could be set to autosubmit so no user interaction is required except for following a link.

Upgrade to version 1.24 or later.

Disclosure policy
dxw believes in responsible disclosure. Your attention is drawn to our disclosure policy:

Please contact us on to acknowledge this report if you received it via a third party (for example, as they generally cannot communicate with us on your behalf.

This vulnerability will be published if we do not receive a response to this report with 14 days.


2018-03-20: Discovered
2018-03-27: Reported to author via
2018-03-27: Vendor responded
2018-03-29: Vendor reported issue fixed in version 1.24

Discovered by dxw:
Tom Adams
Please visit for more information.

Sent through the Full Disclosure mailing list
Web Archives & RSS:

Powered by blists - more mailing lists