Millions of WordPress sites get forced update to patch critical plugin flaw

FOR YOUR OWN GOOD —

UpdraftPlus vulnerability allows untrusted visitors to download a full database backup.


Millions of WordPress sites get forced update to patch critical plugin flaw

Getty Images

Millions of WordPress sites have received a forced update over the past day to fix a critical vulnerability in a plugin called UpdraftPlus.

The mandatory patch came at the request of UpdraftPlus developers because of the severity of the vulnerability, which allows untrusted subscribers, customers, and others to download the site’s private database as long as they have an account on the vulnerable site. Databases frequently include sensitive information about customers or the site’s security settings, leaving millions of sites susceptible to serious data breaches that spill passwords, user names, IP addresses, and more.

Bad outcomes, easy to exploit

UpdraftPlus simplifies the process of backing up and restoring website databases and is the Internet’s most widely used scheduled backup plugin for the WordPress content management system. It streamlines data backup to Dropbox, Google Drive, Amazon S3, and other cloud services. Its developers say it also allows users to schedule regular backups and is faster and uses fewer server resources than competing WordPress plugins.

“This bug is pretty easy to exploit, with some very bad outcomes if it does get exploited,” said Marc Montpas, the security researcher who discovered the vulnerability and privately reported it to the plugin developers. “It made it possible for low-privilege users to download a site’s backups, which include raw database backups. Low-privilege accounts could mean a lot of things. Regular subscribers, customers (on e-commerce sites, for example), etc.”

Montpas, a researcher at website security firm Jetpack, said he found the vulnerability during a security audit of the plugin and provided details to UpdraftPlus developers on Tuesday. A day later, the developers published a fix and agreed to force-install it on WordPress sites that had the plugin installed.

Stats provided by WordPress.org show that 1.7 million sites received the update on Thursday, and more than an additional 287,000 had installed it as of press time. WordPress says the plugin has 3+ million users.

In disclosing the vulnerability on Thursday, UpdraftPlus wrote:

This defect allows any logged-in user on a WordPress installation with UpdraftPlus active to exercise the privilege of downloading an existing backup, a privilege which should have been restricted to administrative users only. This was possible because of a missing permissions check on code related to checking current backup status. This allowed the obtaining of an internal identifier which was otherwise unknown and could then be used to pass a check upon permission to download.

This means that if your WordPress site allows untrusted users to have a WordPress login, and if you have any existing backup, then you are potentially vulnerable to a technically skilled user working out how to download the existing backup. Affected sites are at risk of data loss / data theft via the attacker accessing a copy of your site’s backup, if your site contains anything non-public. I say “technically skilled” because at that point, no public proof of how to leverage this exploit has been made. At this point in time, it relies upon a hacker reverse-engineering the changes in the latest UpdraftPlus release to work it out. However, you should certainly not rely upon this taking long but should update immediately. If you are the only user on your WordPress site, or if all your users are trusted, then you are not vulnerable, but we still recommend updating in any case.

Note: This article have been indexed to our site. We do not claim legitimacy, ownership or copyright of any of the content above. To see the article at original source Click Here

Related Posts
In 2022, robots will do the floor cleaning!  "Rumba e5" is a great chance of 40,000 yen with Echo Dot and spare parts!  [Amazon first sale sale] thumbnail

In 2022, robots will do the floor cleaning! “Rumba e5” is a great chance of 40,000 yen with Echo Dot and spare parts! [Amazon first sale sale]

長らく安心! ひとり暮らし最適なスターターキット。ロボット掃除機のおかげで、毎日の床掃除って本当に楽になりましたよねー。えっ?まだお使いでない?だったら、このAmazon初売りでお迎えしちゃいましょうよ。ルンバのエントリーモデル「ルンバ e5」が交換パーツキットとEcho Dotとセットになって4万円!という魅惑の福袋で登場しています。「ルンバ e5」は1〜2部屋のお掃除に適したモデルで、マッピング機能こそありませんけど、障害物の周りもきちんとお掃除してくれたり、ブラシもゴム製で髪の毛が絡まず、 ダストボックスは水洗いできると、メンテナンス性の良い子です。それが純正交換パーツ(普通に買うと7000円近くします…)と、Echo DotついてIoT化まで揃ったスターターキットとして手に入るなら、これはお迎えしない手は無いと思うんですよね。2022年、床掃除はもうロボットでいいでしょう!Source: Amazon
Read More
Cómo recuperar vídeos borrados en Android thumbnail

Cómo recuperar vídeos borrados en Android

Tenemos el teléfono móvil siempre encima y usamos su cámara para todo, desde fotografías a vídeos, pasando también por videollamadas o mensajes de vídeo dejados a conocidos. Así que el móvil se ha convertido, casi sin darnos cuenta, en el almacén de nuestros recuerdos y solemos llevarlos a cuestas, e incluso editarlos allí. Por eso…
Read More
ميتا تنفي تهديدها الانسحاب من أوروبا في حال تطبيق القوانين الجديدة thumbnail

ميتا تنفي تهديدها الانسحاب من أوروبا في حال تطبيق القوانين الجديدة

قالت شركة ميتا في بيان على موقعها إنها لا ترغب أو تهدد بالانسحاب من أوروبا مثلما تحدثت التقارير التي راجت مؤخرًا؛ حيث ظهرت العديد من التقارير تتحدث عن تهديد الشركة بسحب فيس بوك و انستجرام من أوروبا في حال أجبرها الاتحاد الأوروبي على وضع خوادم البيانات في دول الاتحاد.وقالت ميتا في بيانها إنها كما هو…
Read More

A revamped wired Nest Doorbell is coming in 2022 with 24/7 video recording

Google is feeling the smart home heat. Shortly after Amazon announced its dirt-cheap $50 Blink video doorbell, Nest VP Rishi Chandra announced that Google also has a competing second-generation Nest Doorbell coming next year. And unlike the recently launched battery-powered Nest Doorbell, the new device will be hardwired like the original Nest Hello. That opens…
Read More
Index Of News
Total
0
Share