Wednesday, December 6, 2023

Ferrari Website Flaw Exposes Their Database Credentials

Based on the recent report from char49, it appears that there was a critical flaw in Ferrari’s subdomain, which led to an arbitrary file read vulnerability.

The vulnerability existed in the subdomain using a vulnerable WordPress plugin (W3 Total Cache) that could allow threat actors to read sensitive files on the server.

The W3 Total Cache plugin is used by millions of WordPress websites, increasing website performance. However, Ferrari had an outdated version of this plugin which threat actors could’ve exploited.

Technical Analysis

Ferrari was running on WordPress CMS(Content Management System), discovered by Inspecting elements with the Developer Tools offered by some browsers.

Hence, initial reconnaissance started with WPScan which revealed some interesting information like installed plugins on the website. This enumeration showed the W3 Total Cache version as 0.9.3, which was outdated. The latest version of this plugin was found to be v2.3.1.

Further research by the research team and some Google Dorking led to the discovery of CVE-2019-6715, in which W3 Total Cache Versions before v0.9.4 were vulnerable to unauthenticated arbitrary file read vulnerability.

The wp-config.php file must be located on the server to exploit this vulnerability. The path to this file depends on the operating system and the HTTP server type used.

The operating system was found and confirmed as Ubuntu 14.04.5 LTS by reading the /etc/issue file.

cURL request to /etc/issue file
The response shows the operating system used

The HTTP server was guessed as Apache and was confirmed by sending the request to the /etc/apache2/apache.conf which loaded the Apache configuration file.

Now, the virtual-host configuration file must be found, which is consistently named by the site owners. After several guessing, the virtual-host configuration file was guessed to be which was located at /etc/apache2/sites-enabled/

For finding the DocumentRoot path that servers the WordPress files, a cURL request is sent to the virtual-host configuration file.

cURL request to /etc/apache2/sites-enabled/

The response to this request revealed the DocumentRoot path.

With this gathered information, the wp-config.php file location is found as /home/web/mediaferrari/wp-config.php, which contains the database details and keys.

This extracted sensitive data, including DB name, DB password, DB host and other information.

DB details are revealed through unauthenticated arbitrary file read

This was reported to Ferrari through Ferrari’s Responsible Disclosure Program. Ferrari’s security team immediately acted upon this and fixed the issue. 

It is recommended that all website owners be aware of securing their websites. They must be aware of vulnerable versions of WordPress plugins on their websites frequently and upgrade them to the latest versions to prevent malicious actors from exploiting them.

Struggling to Apply The Security Patch in Your System? – 
Try All-in-One Patch Manager Plus

Also Read:


Latest articles

BlueNoroff: New Malware Attacking MacOS Users

Researchers have uncovered a new Trojan-attacking macOS user that is associated with the BlueNoroff APT...

Serpent Stealer Acquires Browser Passwords and Erases Intrusion Logs

Beneath the surface of the cyber realm, a silent menace emerges—crafted with the precision...

Doppelgänger: Hackers Employ AI to Launch Highly sophistication Attacks

It has been observed that threat actors are using AI technology to conduct illicit...

Kali Linux 2023.4 Released – What’s New!

Kali Linux 2023.4, the latest version of Offensive Security's renowned operating system, has been...

Trickbot Malware Developer Pleads Guilty & Faces 35 Years in Prison

A 40-year-old Russian national, Vladimir Dunaev, pleaded guilty for developing and deploying Trickbot malware....

ICANN Launches RDRS to Assist Law Enforcement Agencies to Discover Private Info

ICANN is a non-profit organization that is responsible for coordinating the global internet's-DNSIP address...

Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry

An American aerospace company has been the target of a commercial cyberespionage campaign dubbed...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles