Frame-14

Privacy Ninja

        • DATA PROTECTION

        • CYBERSECURITY

        • Secure your network against various threat points. VA starts at only S$1,000, while VAPT starts at S$4,000. With Price Beat Guarantee!

        • API Penetration Testing
        • Enhance your digital security posture with our approach that identifies and addresses vulnerabilities within your API framework, ensuring robust protection against cyber threats targeting your digital interfaces.

        • On-Prem & Cloud Network Penetration Testing
        • Boost your network’s resilience with our assessment that uncovers security gaps, so you can strengthen your defences against sophisticated cyber threats targeting your network

        • Web Penetration Testing
        • Fortify your web presence with our specialised web app penetration testing service, designed to uncover and address vulnerabilities, ensuring your website stands resilient against online threats

        • Mobile Penetration Testing
        • Strengthen your mobile ecosystem’s resilience with our in-depth penetration testing service. From applications to underlying systems, we meticulously probe for vulnerabilities

        • Cyber Hygiene Training
        • Empower your team with essential cybersecurity knowledge, covering the latest vulnerabilities, best practices, and proactive defence strategies

        • Thick Client Penetration Testing
        • Elevate your application’s security with our thorough thick client penetration testing service. From standalone desktop applications to complex client-server systems, we meticulously probe for vulnerabilities to fortify your software against potential cyber threats.

        • Source Code Review
        • Ensure the integrity and security of your codebase with our comprehensive service, meticulously analysing code quality, identifying vulnerabilities, and optimising performance for various types of applications, scripts, plugins, and more

        • Email Spoofing Prevention
        • Check if your organisation’s email is vulnerable to hackers and put a stop to it. Receive your free test today!

        • Email Phishing Excercise
        • Strengthen your defense against email threats via simulated attacks that test and educate your team on spotting malicious emails, reducing breach risks and boosting security.

        • Cyber Essentials Bundle
        • Equip your organisation with essential cyber protection through our packages, featuring quarterly breached accounts monitoring, email phishing campaigns, cyber hygiene training, and more. LAUNCHING SOON.

WordPress Plugin Bugs Can Let Attackers Hijack Up To 100K Sites

WordPress Plugin Bugs Can Let Attackers Hijack Up To 100K Sites

Admins of WordPress sites who use the Ultimate Member plugin are urged to update it to the latest version to block attacks attempting to exploit multiple critical and easy to exploit vulnerabilities that could lead to site takeovers.

Ultimate Member is an extensible WordPress plugin with more than 100,000 active installations and is designed to make the task of profile and membership management easier.

The plugin provides support for creating websites allowing for easy sign-up and building online communities with custom privileges for various user roles.

Privilege escalation bugs

In a report published earlier today by Wordfence’s Threat Intelligence team, threat analyst Chloe Chamberland said that the three security flaws disclosed by Wordfence could have allowed attackers to escalate their privileges to admin ones and fully take over any WordPress site using a vulnerable Ultimate Member installation.

Also Read: How To Secure Your WiFi Camera? 4 Points To Consider

After disclosing the vulnerabilities to the plugin’s development team on October 26, all three privilege escalation bugs were fixed with the release of Ultimate Member 2.1.12 on October 29.

One of them is considered by Wordfence as “very critical” given that it “makes it possible for originally unauthenticated users to easily escalate their privileges to those of an administrator.”

“Once an attacker has administrative access to a WordPress site, they have effectively taken over the entire site and can perform any action, from taking the site offline to further infecting the site with malware,” Chamberland explained.

Two of the bugs received a maximum CVSS severity rating of 10/10 as they are unauthenticated privilege escalation bugs via user meta (granting admin access upon registration) and user roles (admin role selected during registration).

The third one was rated 9.8/10 as it requires access wp-admin access to the site’s profile.php page but it’s still considered critical since it allows any authenticated attacker to elevate privileges to admin with very little effort.

Thousands of sites still exposed to attacks

Although Ultimate Member 2.1.12, the version that fixes the three vulnerabilities, was released on October 26, the plugin was downloaded roughly 75,000 times (with almost 32,000 of them the day after the update was released) according to historic download data, including both updates and new installs.

This means that at least 25,000 WordPress websites with active Ultimate Member installations are still potentially left exposed to attacks if threat actors will start exploiting these bugs as part of future malicious campaigns.

Ultimate Member users are urged to update the plugin to 2.1.12 as soon as possible to prevent attacks designed to take over sites running vulnerable versions of this plugin.

Also Read: Going Beyond DPO Meaning: Ever Heard of Outsourced DPO?

To put things into perspective when it comes to threat actors’ interest in hijacking WordPress sites, two months ago several of them were actively trying to take control of more than 600,000 sites running unpatched versions of the File Manager plugin.

The flaw they attempted to exploit allowed unauthenticated attackers to upload malicious PHP files and execute arbitrary code on compromised sites.

In all, researchers detected attacks trying to exploit the vulnerability originating from over 370,000 separate IP addresses, with almost no overlap in access activity.

0 Comments

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Data Privacy updates weekly!

Personal Data Protection

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
×

Hello!

Click one of our contacts below to chat on WhatsApp

× Chat with us