Jump to content
Matt

Researchers warn of WordPress data leak flaw

Recommended Posts

Posted

wordpress-logo-370x229.jpg?1302784430

A vulnerability in the way blogging platform WordPress manages uploaded media files could put users at risk of data leaks, say researchers.

A report from security firm White Hat claims that the blogging service may not properly protect media files from prying eyes the same way it guards blog text.

According to White Hat Security technical evangelist Robert Hansen, the flaw leaves users vulnerable because of the way Wordpress assigns URLs. The system, says Hansen, is easy enough to guess that an attacker could potentially root out media files and attachments meant for posts which have yet to go live or be approved.

“The problem is that because the timing between the media and the blog post isn’t identical you can end up in a race condition with the content,” Hansen explained.

“For instance, let’s say you run a publicly traded company and you are about to release your earnings report on your blog. You may upload a PDF of the earnings report a day or multiple days in advance to make sure everything is perfect and ready to go when you announce.”

The company said that overall, the severity of the vulnerability is low. Aside from data leakage, there is no indication that the flaw could be leveraged for more severe attacks, such as account theft or code injection.

Because the Wordpress platform is used to power millions of blogs, it has become a prime target for attackers looking to compromise sites and exploit web pages for use as embedded attack platforms or other malicious activity.

Earlier this year, researchers uncovered a large-scale cybercrime operation which had managed to compromise thousands of WordPress accounts through dictionary-combing 'brute force' attacks that automate the process of guessing passwords.

Sursa V3.co.uk

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...