Saturday, July 20, 2024
EHA

WordPress Plugin Flaw Exposes 200,000+ Websites for Hacking

A critical security flaw has been identified in the Ultimate Member plugin for WordPress, which could potentially put over 200,000 websites at risk.

The vulnerability was discovered by Christiaan Swiers and reported through the Wordfence Bug Bounty Program, earning him a bounty of $2,063.00.

The flaw in question is an unauthenticated SQL Injection vulnerability that could allow attackers to extract sensitive data, such as password hashes, from the affected websites’ databases.

You can analyze a malware file, network, module, and registry activity with the ANY.RUN malware sandbox, and the Threat Intelligence Lookup that will let you interact with the OS directly from the browser.

Ultimate Member Plugin Flaw

The vulnerability was found in versions 2.1.3 to 2.8.2 of the Ultimate Member plugin. It was caused by insufficient escaping of the ‘sorting’ parameter and a lack of preparation in the SQL query, which could be exploited through a Time-Based blind SQL injection approach.

This method involves attackers using SQL CASE statements and the SLEEP() command to extract information based on the response time of each request.

However, it’s important to note that the vulnerability critically affects only those users who have enabled the “Enable custom table for user meta” option, as the vulnerable Member_Directory_Meta class is loaded only in this configuration.

The Wordfence firewall rule detects the malicious SQL query and blocks the request.
The Wordfence firewall rule detects the malicious SQL query and blocks the request.

Disclosure & Prompt Patching

Wordfence received the vulnerability submission on January 30, 2024. The same day, they validated the report, confirmed the exploit, and contacted the Ultimate Member Team.

The team responded promptly and began working on a fix after receiving full disclosure details from Wordfence.

The Ultimate Member Team released a patch on February 19, 2024, addressing the vulnerability with the updated version 2.8.3 plugin.

Wordfence urges all users of the Ultimate Member plugin to update to the latest patched version immediately to safeguard their sites against potential attacks.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are extremely harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Website

Latest articles

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

A significant data breach has been reported by a threat actor known as 'Hana,'...

CrowdStrike Update Triggers Widespread Windows BSOD Crashes

A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users,...

Operation Spincaster Disrupts Approval Phishing Technique that Drains Victim’s Wallets

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have...

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles