Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/16/2015
05:00 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Wordpress Dodges Further Embarassment By Patching Three Vulns

The popular platform for building and running websites fixed two XSS-scripting vulnerabilities and a potential privilege escalation exploit that could have put millions of sites at risk.

WordPress has released security updates that fix three issues, including two cross-site scripting vulnerabilities and a potential privilege escalation exploit, which could have allowed potential compromise of millions of live web sites, the company reports.

WordPress, a popular PHP-based Content Management System, is the most prominent web platform on the Internet today, running over 20 percent of the top one million websites worldwide, according to some reports.

As a result, cyber criminals and malicious hackers frequently target WordPress instances to gain access to private databases and internal network access. A typical WordPress compromise is based on exploits of vulnerabilities in an outdated plug-in component and, more recently, brute force attacks on WordPress are on the rise. As Daniel Cid, founder & CTO of Sucuri Security, wrote earlier this month on his company blog:

When you have an unprotected login page, you will see brute force attempts. With WordPress sites, the same rule applies. We see thousands of failed login attempts to /wp-login.php on the websites we protect per minute. In fact, failed login attempts jumped from 5.2 million in January  to 40.9 million on Sept. 15, on sites protected behind Sucuri's firewall.”

Heimdal Security, meanwhile, has observed an increase in malicious scripts injected into legitimate websites that redirect Internet users to the Neutrino exploit kit server when accessed. The company said that the attack is “carried out by systemically compromising websites which run an outdated content management system or outdated plugins." The cyber-attack is mainly directed at websites built on WordPress, according to the company.

Today, it’s all about the core code

However, these latest vulnerabilities were in the core WordPress code. So instead of affecting 5,000 to 10,000 sites that installed a specific plug-in, there was the potential for millions of websites worldwide being compromised, says Shahar Tal, head of vulnerability research with Check Point Technologies, which discovered two of the vulnerabilities

“So that is a different magnitude of discovery,” Tal says.

According to WordPress, version 4.3.1 addresses the following vulnerabilities, as well as fixes 26 bugs:

  • WordPress versions 4.3 and earlier are vulnerable to a cross-site scripting vulnerability when processing shortcode tags (CVE-2015-5714). Reported by Shahar Tal and Netanel Rubin of Check Point.
  • A separate cross-site scripting vulnerability was found in the user list table. Reported by Ben Bidner of the WordPress security team.
  • Finally, in certain cases, users without proper permissions could publish private posts and make them sticky (CVE-2015-5715). Reported by Shahar Tal and Netanel Rubin of Check Point.

Attackers have built specific tools, such as scanners, to search out and exploit vulnerabilities on WordPress platforms, Tal says. “There have been countless stories where adversaries – cybercriminals or nation-state adversaries – have actively infiltrated a WordPress website for multiple reasons,” he says.

Attackers are looking for ways to move laterally throughout an organization’s network. By hacking into a company’s web server, adversaries can continue into the internal network to see what they can find.  A second scenario is a watering hole attack, where an adversary can run arbitrary script code to try and infect every visitor to a website with certain malware, Tal says.

Typically a rare occurrence

Compared to the frequent findings of third-party plug-in vulnerabilities, issues with WordPress core code are rare, Tal notes. WordPress core developers are well-trained and have a high security awareness for all released code. This fact was confirmed during Check Point’s audit of the source code. Developers implement multiple layers of security protecting WordPress from most attack vectors Check Point security researchers can think of, Tal notes.

“WordPress in its core is relatively well-secured in comparison with most PHP code that you typically come across,” Tal says. PHP is a server-side scripting language designed for web development but is also used as a general-purpose programming language.

However, the security team lead by Netanel Rubin was very persistent and found several holes.  The first vulnerability allowed the researchers to escalate privileges from a subscriber user with read-only privileges, to a user who could create, write and post content.  A hacker could also use these privileges and create situations to perform SQL injection attacks on databases.  And, then they also discovered the cross-site scripting vulnerabilities.

Check Point’s team notified WordPress and opened up discussions in which they suggested fixes and a few alternatives to address the problems, Tal says. WordPress took one of the suggested alternatives and fixed the cross-scripting vulnerabilities. The privilege escalation fix was more complicated because it touched a sensitive area of code, plus it affected third-party plug-ins and libraries. As a result, the company needed more testing before coming out with that fix, Tal notes, which is now available in WordPress 4.3.1.

Rutrell Yasin has more than 30 years of experience writing about the application of information technology in business and government. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
A Startup With NSA Roots Wants Silently Disarming Cyberattacks on the Wire to Become the Norm
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/11/2021
Edge-DRsplash-10-edge-articles
Cybersecurity: What Is Truly Essential?
Joshua Goldfarb, Director of Product Management at F5,  5/12/2021
Commentary
3 Cybersecurity Myths to Bust
Etay Maor, Sr. Director Security Strategy at Cato Networks,  5/11/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google Maps is taking "interactive" to a whole new level!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32238
PUBLISHED: 2021-05-18
Epic Games / Psyonix Rocket League <=1.95 is affected by Buffer Overflow. Stack-based buffer overflow occurs when Rocket League handles UPK object files that can result in code execution and denial of service scenario.
CVE-2020-23851
PUBLISHED: 2021-05-18
A stack-based buffer overflow vulnerability exists in ffjpeg through 2020-07-02 in the jfif_decode(void *ctxt, BMP *pb) function at ffjpeg/src/jfif.c:513:28, which could cause a denial of service by submitting a malicious jpeg image.
CVE-2020-23852
PUBLISHED: 2021-05-18
A heap based buffer overflow vulnerability exists in ffjpeg through 2020-07-02 in the jfif_decode(void *ctxt, BMP *pb) function at ffjpeg/src/jfif.c (line 544 & line 545), which could cause a denial of service by submitting a malicious jpeg image.
CVE-2020-23856
PUBLISHED: 2021-05-18
Use-after-Free vulnerability in cflow 1.6 in the void call(char *name, int line) function at src/parser.c, which could cause a denial of service via the pointer variable caller->callee.
CVE-2020-24026
PUBLISHED: 2021-05-18
TinyShop, a free and open source mall based on RageFrame2, has a stored XSS vulnerability that affects version 1.2.0. TinyShop allows XSS via the explain_first and again_explain parameters of the /evaluate/index.php page. The vulnerability may be exploited remotely, resulting in cross-site scripting...