in ,

Researchers find serious flaws in WordPress plugins used on 400k sites, Ars Technica

Researchers find serious flaws in WordPress plugins used on 400k sites, Ars Technica


      IS YOURS ONE OF THEM? –

             

Attention users of InfiniteWP, WP Time Capsule, and WP Database Reset: it’s time to patch.

      

      Jan 45, (******************************************: (am UTC

  

        ********************

The highest-impact flaw is an authentication bypass vulnerability in the

People exploiting the vulnerability need only know the user name of a valid account and include a malicious payload in a POST request that’s sent to a vulnerable site. According to Web application firewall provider Wordfence, the vulnerability stems from a feature that allows legitimate users to

automatically log in as an administrator without providing a password.

“Logical vulnerabilities like the ones seen in this recent disclosure can result in severe issues for Web applications and components,” Marc -Alexandre Montpas, a researcher at Web security firm Sucuri,wrote in a post. “These flaws can be exploited to bypass authentication controls — and in this case, log in to an administrator account without a password.”

Anyone running InfiniteWP Client version 1.9.4.4 or earlier should update to 1.9.4.5 immediately.

The critical flaw in

WP Time Capsulealso leads to an authentication bypass that allows unauthenticated attacksers to log in as an administrator. WP Time Capsule, which runs on about (******************************************************, sites, is designed to make backing up website data easier. By including a string in a POST request, attackers can obtain a list of all administrative accounts and automatically log into the first one. The bug has been fixed in version 1. . Sites running earlier versions should update right away. Web security firm WebARX hasmore details

The last vulnerable plugin is (WP Database Reset) ************, which is installed on about (************************************************, ************************************************************ sites. One flaw allows any unauthenticated person to reset any table in the database to its original WordPress state. The bug is caused by reset functions that aren’t secured by the standard capability checks or security nonces. Exploits can result in the complete loss of data or a site reset to the default WordPress settings.

A second security flaw in WP Database Reset causes a privilege-escalation vulnerability that allows any authenticated user — even those with minimal system rights — to gain administrative rights and lock out all other users. All site administrators using this plugin should update to version 3. 16, which patches both vulnerabilities. Wordfence has more details about both flawshere.

There’s no evidence that any of the three vulnerable plugins are being actively exploited in the wild.

                                                    

What do you think?

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Incident: Ethiopian B737 at Dire Dawa on Jan 9th, swarm of grasshoppers, hacker news

Rocket Report: Key Dragon test on tap, big year for rocket debuts, Ars Technica

Rocket Report: Key Dragon test on tap, big year for rocket debuts, Ars Technica