sábado, 2 de maio de 2015

VIDEO: Just-Released WordPress 0day, Makes it Easy to Hijack Millions of Websites




The WordPress Content Management System Used by Millions of Websites, is Vulnerable to 2 Newly Discovered Threats that Allow Attackers to Take Full Control of the Web Server. Attack Code has been Released that, Targets One of the Latest Versions of WordPress, Making it a 0-Day Exploit that, Could Touch Off a Series of Website Hijackings throughout the Internet. Both Vulnerabilities are Known as Stored, or Persistent, Cross-Site Scripting (XSS) Bugs. They Allow an Attacker to Inject Code into the HTML Content Received by Administrators, Who Maintain the Website. Both Attacks Work by Embedding Malicious Code into the Comments Section that Appear by Default at the Bottom of a WordPress Blog or Article Post. From there, Attackers Can Change Passwords, Add New Administrators, or Take just about Any Other Action Legitimate Admins Can Perform. The Most Serious of the 2 Vulnerabilities is in WordPress v4.2 because, as of Press Time, there is No Patch. "If triggered by a logged-in administrator, under default settings the attacker can leverage the vulnerability to execute arbitrary code on the server via the plugin and theme editors", Jouko Pynnönen, a Researcher with Finland-Based Security Firm, Klikki Oy, Wrote in a Blog Post Published Sunday Evening. "Alternatively the attacker could change the administrator's password, create new administrator accounts, or do whatever else the currently logged-in administrator can do on the target system."


The Exploit Works by Posting Some Simple JavaScript Code as a Comment and then Adding a Massive Amount of Text — about 66,000 Characters or More than 64 Kilobytes Worth. Once the Comment is Processed by Someone Logged in with WordPress Administrator Rights to the Site, the Malicious Code will be Executed with No Outward Indication that, an Attack is Underway. By Default, WordPress Doesn't Automatically Publish Comments to a Post, Unless the User has Already been Approved by an Administrator. Attackers Can Work Around this Limitation, by Posting a Benign Comment that Gets Approved. By Default, Subsequent Comments from that Person will be Automatically Approved and Published to the Same Post. The Attack is Similar to One Disclosed Last Week by Researcher, Cedric Van Bockhaven. That Attack also Embedded Malicious Comments into Comments that were Executed When Viewed by Admins. The Underlying Vulnerability was Fixed with Last Week's Release of WordPress v4.2. A Swarm of WordPress Plugins were also Recently Updated to Kill XSS Vulnerabilities. At the Moment, there's No Fix for the Most Recently Disclosed Bug. Once a Patch is Available, WordPress Admins should Install it Right Away. In the Meantime, they Should Consider Disabling Comments or Installing a Comment Plugin such as Akismet to Mitigate Exploits.




Info Sources:

https://en.wikipedia.org/wiki/Cross-site_scripting

http://klikki.fi/adv/wordpress2.html

https://cedricvb.be/post/wordpress-stored-xss-vulnerability-4-1-2

https://wordpress.org/plugins/akismet

https://youtu.be/OCqQZJZ1Ie4


Here's the Critical Security Update to Solve this Bug:

https://wordpress.org/news/2015/04/wordpress-4-2-1


0 comentários:

Enviar um comentário