HackDig : Dig high-quality web security articles

«No Previous
No Next

Website Takeover Issue Fixed in WordPress' Most Popular Plugin

2016-07-12 07:20

Older versions of the All in One SEO Pack WordPress plugin contain a vulnerability that allows an attacker to store malicious code in the website's admin panel that could potentially help them take over the website.

At the time of writing, when accessing the WordPress Plugin directory's Popular section, the first plugin listed above everyone else is All in One SEO Pack by Semper Fi Web Design.

The plugin helps webmasters improve their site's SEO (Search Engine Optimization) features via an easy-to-use wall of on/off settings.

Issue found in the Bot Blocker feature

One of those settings is called Bot Blocker and allows users to decide what search engine crawlers to block from accessing their site. This setting is off by default, so there's no reason for all plugin users to worry.

Where webmasters have turned this feature on, they probably know that it also logs all rejected bots and the time when they visit their sites.

According to security researcher David Vaartjes, the plugin logs these visits without sanitizing the text included in the User Agent strings and Referrer headers sections.

Vulnerability exploitation is trivial

An attacker only has to change one of these two features by appending malicious code at the end, for a bot that they know is blocked on the site.

This (malicious) code gets stored in the WordPress site's database and automatically executed when the admin visits the log page.

Packing JavaScript code that steals admin user cookies is trivial for any low-to-mid skilled attacker. The cookies can be used to hijack admin login sessions or to carry out other CSRF attacks.

Webmasters using this plugin should know that this issue is fixed in the plugin's latest version, which at the time of writing is 2.3.7. This attack was only tested in All in One SEO Pack version 2.3.6.1, which doesn't exclude the fact that older versions might be vulnerable as well. In this case, updating to the latest version is advised.

Exploit proof of concept
Exploit proof of concept


Source: .902605-nigulp-ralupop-tsom-sserpdrow-ni-dexif-eussi-revoekat-etisbew/swen/moc.aideptfos.swen

Read:5165 | Comments:0 | Tags:Security Fixes and Improvements

“Website Takeover Issue Fixed in WordPress' Most Popular Plugin”0 Comments

Submit A Comment

Name:

Email:

Blog :

Verification Code:

Announce

Share high-quality web security related articles with you:)
Tell me why you support me <3