Home

Jan 3, 2020

WP Database Reset Plugin Had Some ‘Easily Exploitable’ Vulnerabilities

authorarticle: Master3395
WP_zStatistics_zwordpress_zplugin.jpg
video: 
youtube: 
sources: 
keywords: bug, flaw, vulnerability, vulnerable WordPress plugin, wordpress, wordpress exploit, wordpress patch, WordPress plugin
Category: General
Posted by: Admin

Another threat to WordPress sites has surfaced online. Researchers have discovered some serious security vulnerabilities in the WP Database Reset plugin. What’s threatening with these vulnerabilities is their easily exploitable nature.

WP Database Reset Plugin Flaws Reportedly, researchers from Wordfence have spotted security flaws in one more WordPress plugin. This time, they found some ‘easily exploitable’ vulnerabilities in the WP Database Reset plugin.

As described in their blog post, the researchers found two different security issues with the plugin. The first of these is a critical severity bug (CVE-2020-7048) with a CVSS score of 9.1. This unauthenticated database reset issue could allow an adversary to reset any table in the database, thus causing data loss.

To trigger the flaw, the attacker would only have to send a malicious request to the site. Describing the impact of a possible exploit, the researchers stated,

A WordPress database stores all data that makes up the site including posts, pages, users, site options, comments, and more. With a few simple clicks and a couple of seconds, an unauthenticated user could wipe an entire WordPress installation clean if that installation was using a vulnerable version of this plugin.

The second vulnerability (CVE-2020-7047) was a privilege escalation bug with a high-severity rating and a CVSS score of 8.8.

This bug allowed any user with subscriber access to escalate privilege levels. In turn, the bug allowed the attacker to exploit the previous vulnerability as well. Explaining about the vulnerability, the researchers stated,

Any user authenticated as a subscriber and above had the ability to reset the wp_users table. Whenever the wp_users table was reset, it dropped all users from the user table, including any administrators, except for the currently logged-in user.

The user sending the request would automatically be escalated to the administrator, even if they were only a subscriber.

An adversary could therefore completely takeover of the target website, rendering the actual admins unable to gain access. The following video demonstrates the attack scenario.

Patch Released – Update Now! According to Wordfence, the vulnerabilities affected all previously available WP Database Reset plugin versions. Upon noticing the flaw, the researchers disclosed the vulnerabilities to the plugin developers, who then patched the bugs.

Consequently, WP Database Reset version 3.15 rolled out containing the patches for both bugs. Presently, the plugin boasts over 80,000 active installations, hence making thousands of sites vulnerable to potential exploits. Therefore, the users of this plugin must ensure updating their sites to the latest plugin version to stay safe. Let us know your thoughts in the comments.

 

authorarticle: Master3395
WP_zStatistics_zwordpress_zplugin.jpg
video: 
youtube: 
sources: 
keywords: bug, flaw, vulnerability, vulnerable WordPress plugin, wordpress, wordpress exploit, wordpress patch, WordPress plugin

Comments:

comments powered by Disqus

Return

Sponsored Ads:

Discord

Page 1 of 563  >  >>

Mozilla tightens belt, folds two Firefox services

mozilla.jpg

Sep 21, 2020 | Category: General | Comments

The Firefox browser maker is having to trim its sails again.

read more…

The United States bans TikTok and WeChat on Sunday

Tiktok.jpg

Sep 20, 2020 | Category: General | Comments

It is now known that the USA will ban WeChat and TikTok from the Apple App Store in the USA next Sunday.

read more…

Google's Chrome OS pivot matters more than you think

Chrome.jpg

Sep 19, 2020 | Category: Google | Comments

A colossal change is on the way for Chromebooks — and if you're seeing only what's on the surface, you're missing what's most important.

read more…

Page 1 of 563  >  >>