Nov 4, 2014

Vulnerability in e-Commerce Wordpress Plugin: Buy Anything Without Paying

wordpress-ecommerce-plugin
Vulnerability in e-Commerce Wordpress Plugin: Buy Anything Without Paying

Alongside Drupal, one of the most popular CMS Wordpress seems also to be vulnerable to serious flaws. Researchers at Sucuri have found an information leak and access control bypass vulnerability in popular WP eCommerce Plugin.

WP eCommerce Plugin is mainly used for selling products, downloads as well as memberships online. The number of downloads of this plugin clearly says how much popular it is- 2.9 Million.

According to the researchers, the vulnerability can be exploited by a remote attacker by gaining access to names, email addresses, billing addresses and other information belonging to the users who made purchases through the Plugin.Sucuri also said that those data can be manipulated easily by the attacker.

 
Sucuri Researcher Mickael Nadeau said

An attacker could perform administrative-related tasks without actually being authenticated as an administrator on the targeted website. Using this vulnerability, one could send few requests to websites database, dumping all client personal information.It is also possible for someone to buy products and change the status of their transactions to Accepted Payment without actually making the payment.   

 The flaw came to Sucuri's vision during their routine audit of Windows Firewall. After founding the vulnerability, WP eCommerce Plugin Developer Team was immediately contacted and they patched the flaw by launching 3.8.14.4

 

What is the Flaw?


Sucuri posted in their blog


The plugin developers assumed that the WordPress’s admin_init hook was only called when the administrator was logged in and visited a page inside /wp-admin/. However, any call to /wp-admin/admin-post.php (or admin-ajax) also executes this hook without requiring the user to be authenticated.

Sucuri did not disclose enough technical details about the Vulnerability as they want to give the webmasters time to fix the flaw. They also said that this flaw looks similar to the vulnerability they found in MailPoet Newsletter Plugin some weeks ago.

No comments:

Post a Comment