Home

Jan 3, 2020

WP Database Reset Plugin Had Some ‘Easily Exploitable’ Vulnerabilities

authorarticle: Master3395
WP_zStatistics_zwordpress_zplugin.jpg
video: 
youtube: 
sources: 
keywords: bug, flaw, vulnerability, vulnerable WordPress plugin, wordpress, wordpress exploit, wordpress patch, WordPress plugin
Category: General
Posted by: Admin

Another threat to WordPress sites has surfaced online. Researchers have discovered some serious security vulnerabilities in the WP Database Reset plugin. What’s threatening with these vulnerabilities is their easily exploitable nature.

WP Database Reset Plugin Flaws Reportedly, researchers from Wordfence have spotted security flaws in one more WordPress plugin. This time, they found some ‘easily exploitable’ vulnerabilities in the WP Database Reset plugin.

As described in their blog post, the researchers found two different security issues with the plugin. The first of these is a critical severity bug (CVE-2020-7048) with a CVSS score of 9.1. This unauthenticated database reset issue could allow an adversary to reset any table in the database, thus causing data loss.

To trigger the flaw, the attacker would only have to send a malicious request to the site. Describing the impact of a possible exploit, the researchers stated,

A WordPress database stores all data that makes up the site including posts, pages, users, site options, comments, and more. With a few simple clicks and a couple of seconds, an unauthenticated user could wipe an entire WordPress installation clean if that installation was using a vulnerable version of this plugin.

The second vulnerability (CVE-2020-7047) was a privilege escalation bug with a high-severity rating and a CVSS score of 8.8.

This bug allowed any user with subscriber access to escalate privilege levels. In turn, the bug allowed the attacker to exploit the previous vulnerability as well. Explaining about the vulnerability, the researchers stated,

Any user authenticated as a subscriber and above had the ability to reset the wp_users table. Whenever the wp_users table was reset, it dropped all users from the user table, including any administrators, except for the currently logged-in user.

The user sending the request would automatically be escalated to the administrator, even if they were only a subscriber.

An adversary could therefore completely takeover of the target website, rendering the actual admins unable to gain access. The following video demonstrates the attack scenario.

Patch Released – Update Now! According to Wordfence, the vulnerabilities affected all previously available WP Database Reset plugin versions. Upon noticing the flaw, the researchers disclosed the vulnerabilities to the plugin developers, who then patched the bugs.

Consequently, WP Database Reset version 3.15 rolled out containing the patches for both bugs. Presently, the plugin boasts over 80,000 active installations, hence making thousands of sites vulnerable to potential exploits. Therefore, the users of this plugin must ensure updating their sites to the latest plugin version to stay safe. Let us know your thoughts in the comments.

 

authorarticle: Master3395
WP_zStatistics_zwordpress_zplugin.jpg
video: 
youtube: 
sources: 
keywords: bug, flaw, vulnerability, vulnerable WordPress plugin, wordpress, wordpress exploit, wordpress patch, WordPress plugin

Comments:

comments powered by Disqus

Return

Sponsored Ads:

Discord

Page 1 of 539  >  >>

Check out this Logitech mouse for Mac

Logitech.jpg

Jul 9, 2020 | Category: Apple | Comments

The new keyboard also unveiled.

read more…

Now comes the new video standard that halves the size

picture-smartphone.jpg

Jul 8, 2020 | Category: IT | Comments

But it will unfortunately take many years.

read more…

Launches iPhone video app that does the one thing Apple denies you

apple.webp

Jul 7, 2020 | Category: Apple | Comments

This is the first to do this.

read more…

Page 1 of 539  >  >>