The plugin was affected by an Auth Bypass vulnerability. The plugin leaks its OAuth
client_secret, which could be used by attackers to gain unauthorized access to the site. Depending on the settings of the OAuth server, we may even be given an administrator role on the client’s website.
Proof of Concept
When we click the “Single Sign On” button, the plugin redirects us to the OAuth server to authenticate ourselves if we are not logged in.
The button invokes the following URL:
The client plugin redirects us to the following URL:
The URL contains the
client_secret code that can be used to request an access token with client credentials grant type authentication.
Exploit script: https://gist.github.com/lana-codes/d5c9c3a79ae50d742df719bf20d9d0ea