SB2019101505 - Multiple vulnerabilities in WordPress
Published: October 15, 2019 Updated: March 25, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Stored cross-site scripting (CVE-ID: CVE-2019-17674)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in Customizer. A remote attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2019-17669)
The disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of URLs. A remote attacker can send a specially crafted HTTP request and trick the application to initiate requests to arbitrary systems.
Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, located in the local network or send malicious requests to other servers from the vulnerable system.
3) Stored cross-site scripting (CVE-ID: CVE-2019-17672)
The disclosed vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data in Style Tags. A remote attacker can inject and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
4) Improper access control (CVE-ID: CVE-2019-17671)
The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists in the "WP_Query" due to improper access restrictions to private and draft posts. A remote unauthenticated attacker can use a method to view posts.
Example:
http://[host]/?static=1&order=asc
5) Spoofing attack (CVE-ID: CVE-2019-17673)
The vulnerability allows a remote attacker to perform a spoofing attack.
The vulnerability exists due to insufficient validation of user-supplied input passed via the Vary: Origin header. A remote attacker can send a specially crafted HTTP GET request to poison the cache of JSON files.
6) Improper input validation (CVE-ID: CVE-2019-17675)
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient validation of user-supplied input passed via the referred header in the admin panel. A remote attacker can trick a victim to visit a specially crafted webpage and bypass implemented security restrictions that rely on HTTP referrer header.
7) Server-Side Request Forgery (SSRF) (CVE-ID: CVE-2019-17670)
The disclosed vulnerability allows a remote attacker to perform SSRF attacks.
The vulnerability exists due to insufficient validation of relative paths on Windows system. A remote attacker can send a specially crafted HTTP request to the website and trick the application to initiate requests to arbitrary systems.
Successful exploitation of this vulnerability may allow a remote attacker gain access to sensitive data, but requires that WordPress in deployed on Windows system.
Remediation
Install update from vendor's website.
References
- https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/
- https://blog.wpscan.org/wordpress/security/release/2019/10/15/wordpress-524-security-release-breakdown.html
- https://github.com/WordPress/WordPress/commit/9db44754b9e4044690a6c32fd74b9d5fe26b07b2
- https://github.com/WordPress/WordPress/commit/f82ed753cf00329a5e41f2cb6dc521085136f308
- https://0day.work/proof-of-concept-for-wordpress-5-2-3-viewing-unauthenticated-posts/
- https://github.com/WordPress/WordPress/commit/b224c251adfa16a5f84074a3c0886270c9df38de
- https://github.com/WordPress/WordPress/commit/b183fd1cca0b44a92f0264823dd9f22d2fd8b8d0
- https://core.trac.wordpress.org/changeset/46472
- https://lists.debian.org/debian-lts-announce/2019/11/msg00000.html
- https://wpvulndb.com/vulnerabilities/9912