<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Pressed Words &#187; nonce</title>
	<atom:link href="http://pressedwords.com/tag/nonce/feed/" rel="self" type="application/rss+xml" />
	<link>http://pressedwords.com</link>
	<description>News and commentary about all things WordPress</description>
	<lastBuildDate>Thu, 11 Jun 2009 03:54:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>CSRF Attack on WordPress</title>
		<link>http://pressedwords.com/csrf-attack-on-wordpress/</link>
		<comments>http://pressedwords.com/csrf-attack-on-wordpress/#comments</comments>
		<pubDate>Wed, 13 Feb 2008 16:47:15 +0000</pubDate>
		<dc:creator><![CDATA[Austin Matzko]]></dc:creator>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[AYS]]></category>
		<category><![CDATA[CSRF]]></category>
		<category><![CDATA[nonce]]></category>

		<guid isPermaLink="false">http://pressedwords.com/csrf-attack-on-wordpress/</guid>
		<description><![CDATA[Someone named Ferruh has a proof-of-concept cross-site request forgery (CSRF) attack against WordPress (HT: DK at BlogSecurity). I&#8217;ve tried it out successfully on my own version of WordPress 2.3.3. The scenario is like this: you go to leave a comment on someone&#8217;s site, and surreptitiously that (evil) site tricks you into changing your WordPress admin [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Someone named Ferruh has a proof-of-concept <a href="http://en.wikipedia.org/wiki/Cross-site_request_forgery">cross-site request forgery (CSRF)</a> attack against WordPress (HT: <a href="http://blogsecurity.net/wordpress/ferruh-wordpress-csrf-vulnerability/">DK at BlogSecurity</a>). I&#8217;ve tried it out successfully on my own version of WordPress 2.3.3.</p>
<p>The scenario is like this: you go to leave a comment on someone&#8217;s site, and surreptitiously that (evil) site tricks you into changing your WordPress admin password and emailing it to the evil site owner by clicking what appears to be a comment submission button.  </p>
<p>WordPress guards against CSRF attacks in general by confirming actions that don&#8217;t seem quite right (<a href="http://markjaquith.wordpress.com/2006/06/02/wordpress-203-nonces/">i.e. when the <em>nonces</em> don&#8217;t check out</a>), but this attack hides all of the confirmation message except the approval button, which appears to be part of the evil site&#8217;s comment form.</p>
<p>It&#8217;s very easy to imagine how this could be targeted at a user&#8217;s blog by using the URL the user enters in an evil site&#8217;s comment form.  <a href="http://trac.wordpress.org/ticket/5838">I&#8217;ve submitted a suggested solution as a WordPress Trac ticket</a>. </p>
<p>How can you avoid this attack for now?  Don&#8217;t stay logged in to your WordPress blog when not necessary, and <a href="http://blog.bindanaku.com/2007/03/how-to-change-wordpress-default-username/">change the default username</a> (or blog under another username with just &#8220;author&#8221; permissions, and keep &#8220;admin&#8221; just for occasional site maintenance).  </p>
<p><strong>UPDATE: </strong> My patch has been committed to both <a href="http://trac.wordpress.org/changeset/6813">development WordPress</a> and the <a href="http://trac.wordpress.org/changeset/6818">2.3 branch</a>, so this issue should be taken care of in the next security release. </p>
]]></content:encoded>
			<wfw:commentRss>http://pressedwords.com/csrf-attack-on-wordpress/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

Page Caching using memcached
Database Caching using memcached
Object Caching 193/263 objects using memcached

 Served from: pressedwords.com @ 2026-05-01 14:36:51 by W3 Total Cache -->