RippleSmith Services
  • Home
  • Optimization
  • Marketing
  • About
  • News
  • Contact
  • Home
  • Optimization
  • Marketing
  • RippleSmith Services
  • About
  • News
  • Contact

WordPress Zero-Day Could Expose Password Reset Emails

Web Optimizers
SEO News
WordPress
0

WordPress

Polish security expert Dawid Golunski has discovered a zero-day in the WordPress password reset mechanism that would allow an attacker to obtain the password reset link, under certain circumstances.

The researcher published his findings yesterday, after reporting the flaw to the WordPress security team last July.

After more than ten months and no progress, Golunski decided to go public and inform WordPress site owners of this issue so they could protect their sites by other means.

Zero-day can alter “From” and “Return Path” parameters

The issue, tracked via the CVE-2017-8295 identifier, affects all WordPress versions and is related to how WordPress sites put together the password reset emails.

According to Golunski, an attacker can craft a malicious HTTP request that triggers a tainted password reset operation by injecting a custom SERVER_NAME variable, such as “attacker-domain.com”.

This means that when the WordPress site puts together the password reset email, the “From” and “Return-Path” values will be in the form of “wordpress@attacker-domain.com”.

Password reset email values altered by zero-day

Most users would think this zero-day is useless, as the attacker wouldn’t achieve anything more than sending a password reset email to the legitimate site owner, but from the wrong Sender address.

Zero-day can be weaponized in various ways

In reality, this can be quite dangerous. Golunski details some scenarios in which an attacker could exploit this zero-day.

For example, the attacker could flood the site owner’s email inbox with junk emails. When the corrupted password reset email arrives, because the legitimate user’s inbox would be full, the email server would return the email back to its sender, which in this case would be the tainted “Return-Path” value, meaning the attacker’s email.

Another attack scenario, easier to carry out, would be to watch when a site owner leaves on holiday. If the site admin has enabled an “out-of-office” auto-responder, if the auto-responder includes the original email, then the attacker obtains the password reset email with minimal effort.

Other attack scenarios described by Golunski require social engineering, so there’s a low chance those will succeed with experienced website owners.

These complex exploitation scenarios are most likely the main reason why the WordPress team has not prioritized patching this issue until now.

Some mitigations available

Webmasters managing high-value sites looking for a way to prevent exploitation of this zero-day have some options at their dispossable.

“As a temporary solution users can enable UseCanonicalName to enforce [a] static SERVER_NAME value,” Golunski proposes.

On Reddit, other users also recommended that site owners “create a dummy vhost that catches all requests with unrecognized Host headers.”

Depending on your technical prowess, you can also experiment with other mitigations discussed in this Reddit thread, at least until the WordPress team patches this issue.

Also yesterday, Golunski released details about another method to exploit WordPress sites via a remote-code execution flaw in the PHPMailer library, a library included with the WordPress core source code. This issue came to light earlier in the year, but Golunski only now revealed more details about the exploitation mechanism against WordPress sites.

Article source: https://www.bleepingcomputer.com/news/security/wordpress-zero-day-could-expose-password-reset-emails/

0Shares
PrevNext

Related Posts

November 25, 2017

SEO Guide: How to Optimize Your Posts in WordPress

Web OptimizersSEO News0
May 24, 2017

How Korske Ara of World Photo Day Uses WordPress

Web OptimizersSEO News0
May 22, 2017

Top 3 SEO plugins for WordPress 2017

Web OptimizersSEO News0

About Us

Based in Vancouver, BC and serving North America, RippleSmith Services is Google Ads certified and is recognized as a trusted business partner of Google. Get in touch to learn more how we can help your business.


Recent Posts

  • SEM vs. SEO vs. PPC Defined: What’s the Difference?
  • Search Engine Land unveils Periodic Tables of PPC
  • SEO Strategy vs. Tactics: What’s the Difference? A Lot!
  • 5 easy but smart SEO wins to boost content and link-building efforts
  • Get In The Race: The PPC Sprint And SEO Marathon

Explore

  • Home
  • Optimization
  • Marketing
  • About
  • News
  • Contact

Topics

Analytics Google PPC SEO WordPress
COPYRIGHT 2022 RIPPLESMITH SERVICES, ALL RIGHTS RESERVED. PRIVACY.
Toll-Free: 1-800-806-5680
137-1350 Burrard Street, Vancouver, BC, V6Z 0C2