sábado, 9 de maio de 2015

WordPress v4.2.2 Fixes DOM-Based XSS Bug Affecting Millions of Websites

The Maintainers of WordPress Have Released a Critical Security Update for the Content Management System to Version 4.2.2 that, Eliminates a Cross-Site Scripting (XSS) Bug, Present in All Plugins and Themes with the Genericons Icon Font Package. The Vulnerability is Present in Popular Components that are Available in Millions of Websites and Could be Leveraged to Hijack them if Certain Conditions are Met. The Genericons Package includes an HTML File Called, “example.html”, which is Vulnerable to a DOM-Based XSS Attack. The Threat Actor Can Craft a Link Pointing to this Resource and Provide Malicious JavaScript Code that, is Executed in the Context of the Web Browser. If the Link is Accessed by an Authenticated Administrator, there's the Possibility of taking over the Website. On Thursday, All Themes and Plugins Published on WordPress.org were Updated to Remove the HTML File that, Allowed the Security Breach. One of the Themes Affected is Twenty Fifteen, which was Downloaded almost 73,000 Times.


However, it is also Present in the Default WordPress Package and is thus Installed Automatically with the CMS. Jetpack, a Plugin with More than 1 Million Active Installations, was also Updated and No Longer includes the “example.html” File in the Genericons Package. “To help protect other Genericons usage, WordPress 4.2.2 proactively scans the wp-content directory for this HTML file and removes it”, Says a Security Advisory from the Maintainers of the CMS on Thursday. Website Administrators are Urged to Switch to the New Version as Soon as Possible. If this Action Cannot be Performed with the Utmost Urgency, the Security Flaw Can be Mended by Deleting the “example.html” File in the “Genericons” Folder. Alternatively, Access to this Resource Can be Blocked via Security Products Protecting the Website (Firewall, IDS). According to Sucuri, the Flaw is currently Exploited in the Wild, although the Proof-of-Concept they’ve Seen Doesn't Compromise Websites and Only Causes a JavaScript Alert.




Info Source:

https://wordpress.org/news/2015/05/wordpress-4-2-2



0 comentários:

Enviar um comentário