Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV //

Malware

3/26/2019
08:20 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

WordPress Zero-Day Vulnerability Found in 'Social Warfare' Plugin

'Social Warfare' was open to attacks through use of a stored Cross-Site Scripting (XSS) vulnerability that was introduced with the latest change made to the plugin (3.5.2).

A WordPress plugin with over 70,000 installations was found to have a zero-day vulnerability that was exploited in the wild.

The plugin, "Social Warfare," was open to attacks through use of a stored Cross-Site Scripting (XSS) vulnerability that was introduced with the latest change made to the plugin (3.5.2). The flaw would allow attackers to inject malicious JavaScript code into the social share links present on a site's posts.

The Social Warfare plugin is one of the most popular WordPress social media sharing plugins and has more than 805,000 downloads.

An attacker using the zero day would be able to input a URL pointing to a crafted configuration document, which would then overwrite the plugin's settings on the victim's site.

Wordfence, a security firm, was able to provide an in-depth analysis of what was actually occurring.

A visitor to a compromised site would be redirected to other malicious sites, such as tech support scams.

Social Warfare posted to Twitter that:

    "We are aware of a zero-day exploit affecting Social Warfare currently being taken advantage of in the wild. Our developers are working to release a patch within the next hour. In the meantime, we recommend disabling the plugin. We will update you as soon as we know more. — Warfare Plugins (@warfareplugins)"

The plugin developers came up with the 3.5.3 update in rather short order which basically rolled back the changes made in 3.5.2, and therefore the vulnerability. The plugin's Changelog indicated the update was an "Immediate security patch for 3.5.x" without further information.

The 3.5.2 version of the plugin was pulled from the WordPress repository for a period, and then reinstated. That would mean an automatic notification of a needed update for the plugin would be generated.

Additionally, the developers also made a direct link to the corrected version available before it made it into the repository to increase the speed of dissemination.

However, the sites using Social Warfare were not mollified so easily. One, TechAeris, illuminated what they felt to be the real problem: trust.

"When you run a website," it posted on its site, "a certain level of trust extends to the developers of plugins you run to help enhance your website, especially when you are paying for premium plugins. When you're running plugins that 70,000 other websites are running, that trust factor gains a sort of implied additional trust. Sure, mistakes happen, and sure Social Warfare was relatively quick with a fix once they were made aware of the exploit. But, unfortunately, that earned trust has been broken and we will be moving on."

How customers react to a stressful situation is always unpredictable. Some, like TechAeris, will just walk away. Others will continue the relationship into the future. But this example shows how coding problems can end up affecting a product's bottom line in a meaningful way.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-28048
PUBLISHED: 2021-04-14
An overly permissive CORS policy in Devolutions Server before 2021.1 and Devolutions Server LTS before 2020.3.18 allows a remote attacker to leak cross-origin data via a crafted HTML page.
CVE-2021-28157
PUBLISHED: 2021-04-14
An SQL Injection issue in Devolutions Server before 2021.1 and Devolutions Server LTS before 2020.3.18 allows an administrative user to execute arbitrary SQL commands via a username in api/security/userinfo/delete.
CVE-2021-26030
PUBLISHED: 2021-04-14
An issue was discovered in Joomla! 3.0.0 through 3.9.25. Inadequate escaping allowed XSS attacks using the logo parameter of the default templates on error page
CVE-2021-26031
PUBLISHED: 2021-04-14
An issue was discovered in Joomla! 3.0.0 through 3.9.25. Inadequate filters on module layout settings could lead to an LFI.
CVE-2021-27710
PUBLISHED: 2021-04-14
Command Injection in TOTOLINK X5000R router with firmware v9.1.0u.6118_B20201102, and TOTOLINK A720R router with firmware v4.1.5cu.470_B20200911 allows remote attackers to execute arbitrary OS commands by sending a modified HTTP request. This occurs because the function executes glibc's system funct...