Saturday, April 27, 2024

4 Million Shops Installed WooCommerce Plugin RCE Flaw Allows Attacker to Gain WordPress Sites Admin Access

WordPress based E-commerce websites that powered by E-commerce plugin WooCommerce contains Critical Remote code execution vulnerability that allows nor managers to gain admin-level privilege in WordPress websites.

WooCommerce is very popular E-commerce plugin for WordPress that installed more than 4 million users to help for small to large-sized online merchants for WordPress based E-commerce.

A file deletion vulnerability was discovered in WooCommerce that leads to escalating the privileges in WordPress online store & allows shop manager to delete certain files and gain the complete admin privilege.

An unpatched design flaw in WordPress site one of the reasons that this vulnerability to perform privilege escalation and take over the complete admin access.

According to the researchers, “Arbitrary file deletion vulnerabilities aren’t considered critical in most cases as the only thing an attacker can cause is a Denial of Service by deleting the index.php of the website.”

In order to perform successful admin access, the attacker must be having a role of shop manager who can be employees of the store that can manage orders, products, and customers.

Cybercriminals gain these access using various attack methods such as XSS vulnerabilities or phishing attacks.

WooCommerce RCE Flaw Working Method

Basically shop manager roles allowed to perform certain limited access such as Read Private post, Edit users, Edit posts and this access will be allocated when Administrator install the WooCommerce plugin.

It will be reflected in WordPress core settings that means it works even after admin disable the plugin.

In order to ensure that only privileged users can access the edit another user, its calls tocurrent_user_can() a function which means (Can the user trying to perform this action edit the specific user with the ID $target_user_id?).

According to the Ripstech, “By default the edit_users capability allows users who have this privilege, e.g. shop managers, to edit any user, even administrators and perform actions such as updating their passwords. For security reasons, WooCommerce needs to specify that shop managers should be able to edit users, but only those with the customer role.”

To perform this operation plugins such as WooCommerce can add meta capabilities and it works only when the plugin is active.

But the problem is user roles get stored in the database so it keeps working even after disable.

it means that’ “meta privilege check” which restricts shop managers from editing administrators would not execute and the default behavior of allowing users edit_usersto edit any user, even administrators, would occur.”

So finally the hop manager will update the password of the admin account and gain the complete access of the site.

You can see Proof Video that explains how this exploit works to take over admin access.

Website

Latest articles

NETGEAR buffer Overflow Vulnerability Let Attackers Bypass Authentication

Some router models have identified a security vulnerability that allows attackers to bypass authentication.To...

5000+ CrushFTP Servers Hacked Using Zero-Day Exploit

Hackers often target CrushFTP servers as they contain sensitive data and are used for...

13,142,840 DDoS Attacks Targeted Organization Around The Globe

DDoS attacks are a significant and growing risk that can overpower websites, crash servers,...

Hackers Exploit Old Microsoft Office 0-day to Deliver Cobalt Strike

Hackers have leveraged an old Microsoft Office vulnerability, CVE-2017-8570, to deploy the notorious Cobalt...

Microsoft Publicly Releases MS-DOS 4.0 Source Code

In a historic move, Microsoft has made the source code for MS-DOS 4.0, one...

New SSLoad Malware Combined With Tools Hijacking Entire Network Domain

A new attack campaign has been discovered to be employed by the FROZEN#SHADOW, which...

Palo Alto Networks Shares Remediation Advice for Hacked Firewalls

Palo Alto Networks has issued urgent remediation advice after discovering a critical vulnerability, designated...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles