标题 简介 类型 公开时间
关联规则 关联知识 关联工具 关联文档 关联抓包
参考1(官网)
参考2
参考3
详情
[SAFE-ID: JIWO-2024-776]   作者: ecawen 发表于: [2017-10-04]

本文共 [389] 位读者顶过

WordPress安全公司的研究人员表示黑客已经利用了三个0day漏洞在WordPress网站上部署后门。受该0day漏洞影响的包括以下三个插件,Appointments, RegistrationMagic-Custom Registration Forms, 和Flickr Gallery。

Hackers have exploited three zero-days to install backdoors on WordPress sites, according to a security alert published minutes ago by WordPress security firm Wordfence.

The zero-days affect three WordPress plugins — Appointments, RegistrationMagic-Custom Registration Forms, and Flickr Gallery.

The plugins' authors released updates to fix the attack vector — a PHP object injection vulnerability that affects all three plugins in the same way.

0-days allow hackers to install backdoors on vulnerable sites

"This vulnerability allowed attackers to cause a vulnerable website to fetch a remote file (a PHP backdoor) and save it to a location of their choice," says Wordfence researcher Brad Haas.

According to Haas, the vulnerability is hilariously easy to exploit, requiring the attackers to package the exploit code inside an HTTP POST request sent to the victim site. Attackers don't need to be authenticated on the site to trigger the exploit.

For sites running the Flickr Gallery plugin, the hacker has to target the site's root URL, while for the other two, the hacker has to aim the POST request at the admin-ajax.php file.

Once the hacker tricked sites into downloading the backdoor, he can take over sites within minutes.

Only 21,000 sites vulnerable

Wordfence said it detected the zero-days after investigating a series of hacked sites and finding evidence of past exploitation.

There is good and bad news. The good news is that the plugins are not that popular, having around 21,000 installations combined.

The bad news is that the zero-days are easy to exploit and other hackers can reverse engineer the plugin changelogs to deduce the exploit code.

The vulnerability at the core of these zero-days has a score of 9.8 out of 10 on the CVSSv3 severity scale, which is very high, and classifies the vulnerability as "Critical."

Website owners can update the plugins to the patched versions, or they can uninstall the plugins, just to be on the safe side. Below are the plugin versions where developers fixed the vulnerabilities:

 Appointments by WPMU Dev (fixed in 2.2.2) [~ 9,000 installations][出自:jiwo.org]
 Flickr Gallery by Dan Coulter (fixed in 1.5.3) [~ 4,000 installations]
 RegistrationMagic-Custom Registration Forms by CMSHelpLive (fixed in 3.7.9.3) [~ 8,000 installations]

评论

暂无
发表评论
 返回顶部 
热度(389)
 关注微信