WordPress addressed ten security bugs in its latest update

The popular webpage factory has released its 5.5.2 update, which has addressed ten security bugs.

Amongst the bugs is a three-year-old high severity RCE bug that could allow an unauthorised remote attacker to take over a targeted website via a narrowly tailored denial-of-service attack.

WordPress update

In all, the WordPress security and maintenance release tackled ten security enhancements to the platform. WordPress said the update was a “short-cycle security and maintenance release” before the next major release version 5.6.

Of the ten security bugs patched by WordPress a standout flaw, rated high-severity, could be exploited to allow an unauthorised attacker to execute remote code on systems hosting the vulnerability website.

According to a bulletin posted by WordPress back in October, the “vulnerability allows a remote attacker to compromise the affected website”.

“The vulnerability exists due to improper management of internal resources within the application, which can turn a denial – of – service attack into a remote code execution issue.”

Recent WordPress bug

The bug was discovered by security researcher Omar Ganiev, founder of DeteAct. Omar added that the “attack vector is pretty interesting but very hard to reproduce”, and explained:

“Even when the right conditions exist, you have to be able to produce a very accurate DOS attack.”

The bug was discovered by Ganiev three years back but only reported it to WordPress in July 2019, as he wanted to research different proof – of – concept exploits.

“The principal is to trigger the DoS on the MySQL so that WordPress will think that it’s not installed and then un – DoS the DB under the same exception thread,” said Ganiev.

Security updates and credits

 If you haven’t yet updated to 5.5, all WordPress versions since 3.7 have also been updated to fix the following security issues:

  • Props to Alex Concha of the WordPress Security Team for their work in hardening deserialization requests.
  • Props to David Binovec on a fix to disable spam embeds from disabled sites on a multisite network.
  • Thanks to Marc Montas from Sucuri for reporting an issue that could lead to XSS from global variables.
  • Thanks to Justin Tran who reported an issue surrounding privilege escalation in XML-RPC. He also found and disclosed an issue around privilege escalation around post commenting via XML-RPC.
  • Props to Omar Ganiev who reported a method where a DoS attack could lead to RCE.
  • Thanks to Karim El Ouerghemmi from RIPS who disclosed a method to store XSS in post slugs.
  • Thanks to Slavco for reporting, and confirmation from Karim El Ouerghemmi, a method to bypass protected meta that could lead to arbitrary file deletion.
  • Thanks to Erwan LR from WPScan who responsibly disclosed a method that could lead to CSRF.
  • And a special thanks to @zieladam who was integral in many of the releases and patches during this release. Protection Status

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *