• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Ultimate Member Plugin For Wordpress Allows Site Takeover

WordPress Pop-Up Builder Plugin Flaw Plagues 200K Sites

You are here: Home / Latest Cyber Security Vulnerabilities / WordPress Pop-Up Builder Plugin Flaw Plagues 200K Sites

The flaw could have let attackers mail out tailor made newsletters and delete newsletter subscribers from 200,000 influenced web-sites.

Builders of a plugin, employed by WordPress sites for developing pop-up ads for newsletter subscriptions, have issued a patch for a significant flaw. The vulnerability could be exploited by attackers to send out out newsletters with customized information, or to delete or import newsletter subscribers.

✔ Approved Seller by TheCyberSecurity.News From Our Partners
Bitdefender Internet Security 2021

Protect yourself against all threads using Bitderender. Get Bitdefender Internet Security with 68% discount from a bitdefender official seller SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The plugin in query is Popup Builder – Responsive WordPress Pop up – Membership & Publication, from developer Sygnoos. The plugin has been mounted on 200,000 WordPress internet websites. Variations 3.71 and underneath are afflicted by the vulnerability (a take care of has been issued in edition 3.72 and the newest version is 3.73).

“The only necessity for exploitation is that the person is logged in and has obtain to the nonce token,” stated researchers with WebArx on Friday. “It is impacting solutions which in transform could bring about harm to the name and security status of the internet site.”

The issue stems from a lack of authorization for AJAX strategies in the plugin. AJAX is a set of web-enhancement procedures that are utilized to build web apps the AJAX technique is utilised to accomplish an AJAX request.

In this scenario, the AJAX approach does not verify the functionality of the consumer. Because of this, the AJAX endpoint, meant to only be obtainable to administrators, basically also could allow subscriber-level people to execute a selection of steps that can compromise the site’s security, scientists explained. A subscriber is a person part in WordPress, generally the with extremely limited capabilities, including logging into the site and leaving comments.

Just one vulnerable technique is linked to the importConfigView.php file. With out authorization, attackers could use this strategy to import a listing of subscribers from a remote URL, which is then dealt with in the system saveImportedSubscribers. Attackers could also leverage the importConfigView.php file to import malicious files from the remote URL. The only limitation is that if it is not a genuine CSV file (data files created to easily export data and import it into other applications), the file will only output the 1st line of the presented file, reported researchers. Another susceptible process permits attackers to send out out a publication utilizing publication facts taken from the $_Write-up[‘newsletterData’] user input variable.

“This can also contain tailor made email system articles, email sender, and quite a few other characteristics that will in essence allow for a malicious consumer to send out email messages to all subscribers,” mentioned researchers.

Researchers noted that a nonce token is checked – but simply because this nonce token is despatched to all users regardless of their abilities, any person can execute the susceptible AJAX methods as extensive as they move the nonce token. A nonce is a cryptographic number, applied by authentication protocols to secure personal communications by protecting against replay attacks.

Scientists uncovered the flaw on Dec. 2, 2020, and notified the developer on the similar day. A patch was introduced for the flaw on Jan. 22, 2021 in variation 3.72 of the plugin. In this version, the AJAX steps now have an authorization check barring attackers from exploiting the flaw.

WordPress plugins have been identified to have severe vulnerabilities. Earlier in January, researchers warned of two vulnerabilities (a person critical) in a WordPress plugin referred to as Orbit Fox that could let attackers to inject destructive code into susceptible sites and/or choose handle of a web-site.

Obtain our unique Free Threatpost Insider E-book Health care Security Woes Balloon in a Covid-Period Entire world , sponsored by ZeroNorth, to discover additional about what these security pitfalls mean for hospitals at the day-to-day stage and how healthcare security teams can employ greatest procedures to protect suppliers and patients. Get the complete story and Down load the E-book now – on us!


Some elements of this post are sourced from:
threatpost.com

Previous Post: «Cyber Security News Cyber-Cop Charged with Forgery and Bigamy

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • WordPress Pop-Up Builder Plugin Flaw Plagues 200K Sites
  • Cyber-Cop Charged with Forgery and Bigamy
  • Miss England Held to Ransom by Cyber-attackers
  • Flaws in open source library used by DoD, IC for satellite imagery could lead to system takeovers
  • Texas Tech Company Scoops Fourth Equality Title
  • Does SolarWinds change the rules in offensive cyber? Experts say no, but offer alternatives
  • Industrial Gear at Risk from Fuji Code-Execution Bugs
  • Apple iOS 14 Thwarts iMessage Attacks With BlastDoor System
  • 17 Windows 10 problems – and how to fix them
  • A Fifth of Sunburst Backdoor Victims from Manufacturing Industry

Copyright © TheCyberSecurity.News, All Rights Reserved.