Vulnerability in e-Commerce Wordpress Plugin: Buy Anything Without Paying |
Alongside Drupal, one of
the most popular CMS Wordpress seems also to be vulnerable to serious
flaws. Researchers at Sucuri have found an information leak and access
control bypass vulnerability in popular WP eCommerce Plugin.
WP eCommerce Plugin is
mainly used for selling products, downloads as well as memberships
online. The number of downloads of this plugin clearly says how much
popular it is- 2.9 Million.
According to the
researchers, the vulnerability can be exploited by a remote attacker by
gaining access to names, email addresses, billing addresses and other
information belonging to the users who made purchases through the
Plugin.Sucuri also said that those data can be manipulated easily by the
attacker.
Sucuri Researcher Mickael Nadeau said
An attacker could perform administrative-related tasks without actually being authenticated as an administrator on the targeted website. Using this vulnerability, one could send few requests to websites database, dumping all client personal information.It is also possible for someone to buy products and change the status of their transactions to Accepted Payment without actually making the payment.
The flaw came to
Sucuri's vision during their routine audit of Windows Firewall. After
founding the vulnerability, WP eCommerce Plugin Developer Team was
immediately contacted and they patched the flaw by launching 3.8.14.4
What is the Flaw?
Sucuri posted in their blog
The plugin developers assumed that the WordPress’s admin_init hook was only called when the administrator was logged in and visited a page inside /wp-admin/. However, any call to /wp-admin/admin-post.php (or admin-ajax) also executes this hook without requiring the user to be authenticated.
Sucuri did not disclose enough technical details about the Vulnerability as they want to give the webmasters time to fix the flaw. They also said that this flaw looks similar to the vulnerability they found in MailPoet Newsletter Plugin some weeks ago.
No comments:
Post a Comment