Critical bug in WordPress plugin allows site hijacking
Posted on 08 August 2014.
A popular WordPress plugin that allows site owners to easily customize the contact form has a critical vulnerability that can be exploited to download and remotely modify the site's database, and gain access and control of the site - no account or authentication needed.


The discovery was made by researchers of security company Sucuri, and the developers of the plugin - Custom Contact Forms - have been notified, but have finally moved to patch the hole only after the WordPress Security team pushed the issue.

All versions of the plugin except the last (5.1.0.4) are affected, and users are advised to update it as soon as possible. Given the unresponsiveness of the Custom Contact Forms team, the option of switching to another form customization plugin such as Gravity Forms or an entire WP suite that offers the feature is also worth considering.

Custom Contact Form has been downloaded over 600,000 times. If only half of these users actively use it, that is still a considerable number of vulnerable WordPress sites out there.

Incidentally, WordPress and Drupal users should also patch their installations against the recently discovered vulnerability that affects the parsing of the XML-RPC Internet protocol used for cross-platform communication, and which can be misused to launch DoS attacks.

By working together, the WordPress and Drupal security teams have quickly released updated that solve the problem.

"The vulnerability exists in all WordPress and Drupal versions, affecting over 250 million websites, roughly 23% of the Internet website population today," Incapsula researchers pointed out. "Combined with the extremely large pool of targets and the high damage potential, this makes the exploit a triple threat widespread, crippling and hard to weed out."

If, for some reason, you can't update your WP or Drupal installation, the threat can be snuffed out by deleting xmlrpc.php.









Spotlight

Free security software identifies cloud vulnerabilities

Posted on 21 October 2104.  |  Designed for IT and security professionals, the service gives a view of the data exchanged with partner and cloud applications beyond the network firewall. Completely passive, it runs on non-production systems, and does not require firewall changes.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Tue, Oct 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //