header-logo
Suggest Exploit
vendor:
kk Star Ratings
by:
Mohammad Reza Omrani
4.1
CVSS
MEDIUM
Rating Tampering
362
CWE
Product Name: kk Star Ratings
Affected Version From: 5.4.2005
Affected Version To: 38812
Patch Exists: YES
Related CWE: CVE-2023-4642
CPE: a:kk-star-ratings_project:kk-star-ratings:5.4.5
Metasploit:
Other Scripts:
Platforms Tested: Wordpress
2023

kk Star Ratings < 5.4.6 - Rating Manipulation via Race Condition

The kk Star Ratings plugin before version 5.4.6 in WordPress is vulnerable to a race condition that allows an attacker to manipulate ratings. By intercepting the rating submission request using tools like Burp and Turbo Intruder, an attacker can send multiple requests simultaneously to the server, resulting in unauthorized changes to the rating values displayed on the page.

Mitigation:

Update kk Star Ratings plugin to version 5.4.6 or newer to prevent exploitation of this vulnerability.
Source

Exploit-DB raw data:

# Exploit Title: kk Star Ratings < 5.4.6 - Rating Tampering via Race
Condition
# Google Dork: inurl:/wp-content/plugins/kk-star-ratings/
# Date: 2023-11-06
# Exploit Author: Mohammad Reza Omrani
# Vendor Homepage: https://github.com/kamalkhan
# Software Link: https://wordpress.org/plugins/kk-star-ratings/
# WPScan :
https://wpscan.com/vulnerability/6f481d34-6feb-4af2-914c-1f3288f69207/
# Version: 5.4.6
# Tested on: Wordpress 6.2.2
# CVE : CVE-2023-4642

# POC:
1- Install and activate kk Star Ratings.
2- Go to the page that displays the star rating.
3- Using Burp and the Turbo Intruder extension, intercept the rating
submission.
4- Send the request to Turbo Intruder using Action > Extensions > Turbo
Intruder > Send to turbo intruder.
5- Drop the initial request and turn Intercept off.
6- In the Turbo Intruder window, add "%s" to the end of the connection
header (e.g. "Connection: close %s").
7- Use the code `examples/race.py`.
8- Click "Attack" at the bottom of the window. This will send multiple
requests to the server at the same moment.
9- To see the updated total rates, reload the page you tested.