Latest YouTube Video

Tuesday, October 10, 2017

[FD] DefenseCode ThunderScan SAST Advisory: WordPress Ad Widget Plugin Local File Inclusion Security Vulnerability

              DefenseCode ThunderScan SAST Advisory          WordPress Ad Widget Plugin Local File Inclusion                      Security Vulnerability Advisory ID:    DC-2017-01-001 Advisory Title: WordPress Ad Widget Plugin Local file Inclusion  Security Vulnerability Advisory URL:   http://ift.tt/2rhPqdW Software:       WordPress Ad Widget plugin Language:       PHP Version:        2.10.0 and below Vendor Status:  Vendor contacted, update released Release Date:   2017/10/10 Risk:           Medium 1. General Overview =================== During the security audit of Ad Widget plugin for WordPress CMS, security vulnerability was discovered using DefenseCode ThunderScan application source code security analysis platform. More information about ThunderScan is available at URL: http://ift.tt/Vn2J4r 2. Software Overview ==================== According to the plugin developers, Ad Widget enables it's users to easily upload ad images and ad code to their sidebar, for those that don't need or want a complicated ad management system. According to wordpress.org, it has more than 30,000 active installs. Homepage: http://ift.tt/1EgnCmo http://ift.tt/2xwW9iU http://ift.tt/2xuZCmP         3. Vulnerability Description ============================ During the security analysis, ThunderScan discovered Local File Inclusion vulnerability in WP Ad Widget plugin. By requesting a specially crafted URL, the attacker can cause remote server to execute a php file of his choosing. Although the user requesting the URL has to be logged into the WordPress administrative console, the attacker can cause the administrator to request such a URL by using various social engineering/phishing approaches. Specified file will be interpreted by php interpreter, and any valid php code will indeed be executed. If the php installation on server has "allow_url_include=1" configuration option set, this attack can be expanded to execute a php file from any remote URL. If the php version is less than 5.3.4, the ".php" that gets appended to the end of the file name attacker chose can be omitted by adding a null character ("%00") to the requested URL, and enable the attacker to execute any file, regardless of the extension. 3.1. Local File Inclusion   File:       ad-widget\views\modal\index.php   Fucntion:   require "$page.php";   Variable:   $_GET['step'];   Sample URL: http://ift.tt/2xwRXzA   File: ad-widget\views\modal\index.php    

Source: Gmail -> IFTTT-> Blogger

No comments: