WordPress Vulnerability: DoS flaw could bring down your site
WordPress isn’t going to patch it, either…
WordPress is the most popular Content Management System (CMS) in the entire world. In fact, WordPress powers 29% of the web. That’s why it’s alarming the company isn’t going to patch a DoS vulnerability that, when exploited, could easily bring down an entire website.
Let’s start back at the beginning.
Israeli research Barak Tawily discovered a vulnerability (CVE-2018-6389) in the way that “load-scripts.php” processes user-defined requests. “load-scripts.php” is a built-in script that was designed for users with admin permissions to help improve website performance and page load speeds by combining JavaScript files into a single request.
To do this, “load-scripts.php” calls the required JavaScript files by passing their names into its load parameter. Once it’s called every JavaScript file in a given URL it sends them back in a single file.
That’s a lot to untangle, maybe this comparison will help. This script acts kind of like a project manager would: they manage a bunch of different inputs from different team members, then organize it into one coherent document before presenting it to management.
What is the WordPress Vulnerability?
Unfortunately, WordPress, in attempting to make “load-scripts.php” work on the admin login page, forgot to put authentication in place. That means that it’s accessible to anyone.
Here’s where the exploit comes in. Because the “load-scripts.php” file is accessible to anyone an attacker can bring down an entire website simply by forcing “load-scripts.php” to call all possible JavaScript files in one go by passing their names into the Load Parameter. That, in turn, makes the targeted website slow to a crawl due to high usage of the CPU and server memory.
One attacker would likely not be able to take a site down on their own. But Tawily provides a Proof of Concept that showed what a distributed attack could accomplish. Hacker News independently confirmed the exploit. They used it to bring down a test site on a medium-sized server. It was unable to knock another site with a dedicated server offline.
That doesn’t mean the attack wouldn’t still be effective against a site with higher server power. It could still put considerable strain on the server’s resources.
WordPress to the Rescue… or not
Here’s where the story gets aggravating though, Tawily submitted the bug to WordPress, who promptly did nothing. WordPress has no plans to patch it. Their argument is that it should be handled at the server or network level.
Fortunately, Tawily produced a patch for WordPress users.
If you’re a WordPress user, this applies to you. It applies to every WordPress version for the past nine years—including the most recent one (4.9.2).
So maybe get on that.
Happy Monday.
5 Ways to Determine if a Website is Fake, Fraudulent, or a Scam – 2018
in Hashing Out Cyber SecurityHow to Fix ‘ERR_SSL_PROTOCOL_ERROR’ on Google Chrome
in Everything EncryptionRe-Hashed: How to Fix SSL Connection Errors on Android Phones
in Everything EncryptionCloud Security: 5 Serious Emerging Cloud Computing Threats to Avoid
in ssl certificatesThis is what happens when your SSL certificate expires
in Everything EncryptionRe-Hashed: Troubleshoot Firefox’s “Performing TLS Handshake” Message
in Hashing Out Cyber SecurityReport it Right: AMCA got hacked – Not Quest and LabCorp
in Hashing Out Cyber SecurityRe-Hashed: How to clear HSTS settings in Chrome and Firefox
in Everything EncryptionRe-Hashed: The Difference Between SHA-1, SHA-2 and SHA-256 Hash Algorithms
in Everything EncryptionThe Difference Between Root Certificates and Intermediate Certificates
in Everything EncryptionThe difference between Encryption, Hashing and Salting
in Everything EncryptionRe-Hashed: How To Disable Firefox Insecure Password Warnings
in Hashing Out Cyber SecurityCipher Suites: Ciphers, Algorithms and Negotiating Security Settings
in Everything EncryptionThe Ultimate Hacker Movies List for December 2020
in Hashing Out Cyber Security Monthly DigestAnatomy of a Scam: Work from home for Amazon
in Hashing Out Cyber SecurityThe Top 9 Cyber Security Threats That Will Ruin Your Day
in Hashing Out Cyber SecurityHow strong is 256-bit Encryption?
in Everything EncryptionRe-Hashed: How to Trust Manually Installed Root Certificates in iOS 10.3
in Everything EncryptionHow to View SSL Certificate Details in Chrome 56
in Industry LowdownA Call To Let’s Encrypt: Stop Issuing “PayPal” Certificates
in Industry Lowdown