Critical bug in WordPress plugin allows site hijacking
Posted on 08 August 2014.
A popular WordPress plugin that allows site owners to easily customize the contact form has a critical vulnerability that can be exploited to download and remotely modify the site's database, and gain access and control of the site - no account or authentication needed.


The discovery was made by researchers of security company Sucuri, and the developers of the plugin - Custom Contact Forms - have been notified, but have finally moved to patch the hole only after the WordPress Security team pushed the issue.

All versions of the plugin except the last (5.1.0.4) are affected, and users are advised to update it as soon as possible. Given the unresponsiveness of the Custom Contact Forms team, the option of switching to another form customization plugin such as Gravity Forms or an entire WP suite that offers the feature is also worth considering.

Custom Contact Form has been downloaded over 600,000 times. If only half of these users actively use it, that is still a considerable number of vulnerable WordPress sites out there.

Incidentally, WordPress and Drupal users should also patch their installations against the recently discovered vulnerability that affects the parsing of the XML-RPC Internet protocol used for cross-platform communication, and which can be misused to launch DoS attacks.

By working together, the WordPress and Drupal security teams have quickly released updated that solve the problem.

"The vulnerability exists in all WordPress and Drupal versions, affecting over 250 million websites, roughly 23% of the Internet website population today," Incapsula researchers pointed out. "Combined with the extremely large pool of targets and the high damage potential, this makes the exploit a triple threat Ė widespread, crippling and hard to weed out."

If, for some reason, you can't update your WP or Drupal installation, the threat can be snuffed out by deleting xmlrpc.php.









Spotlight

New Zeus variant targets users of 150 banks

Posted on 19 December 2014.  |  A new variant of the infamous Zeus banking and information-stealing Trojan has been created to target the users of over 150 different banks and 20 payment systems in 15 countries, including the UK, the US, Russia, Spain and Japan.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  
DON'T
MISS

Mon, Dec 22nd
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //