2024年6月24日至6月30日WordPress漏洞每週摘要

admin

WordPress Vulnerability Report: June 24, 2024, to June 30, 2024

介紹

The purpose of this report is to provide WordPress site administrators with critical information regarding vulnerabilities discovered in the past week. Keeping abreast of these updates is vital for maintaining site integrity and protecting user data. This report covers the period from June 24, 2024, to June 30, 2024, emphasizing the importance of staying updated with security reports to safeguard websites from potential threats.

關鍵漏洞總結

未修補的漏洞

  • Auto Featured Image: Arbitrary File Upload vulnerability (CVE-2024-6054) remains unpatched.
  • Anima: Stored Cross-Site Scripting vulnerability (CVE-2024-37248) remains unpatched.

Patched Vulnerabilities

  • WordPress Core < 6.5.5: Authenticated Stored Cross-Site Scripting (XSS) vulnerability via HTML API.
  • PayPlus Payment Gateway: Unauthenticated SQL Injection vulnerability (CVE-2024-6205), patched as of June 28, 2024.
  • Several Plugins: Injected Backdoor vulnerability (CVE-2024-6297), patched across multiple plugins including Social Sharing Plugin, Contact Form 7 Multi-Step Addon, Simply Show Hooks, and more.

Vulnerabilities by Severity

  • 批判的: 7 vulnerabilities including PayPlus Payment Gateway and several plugins with injected backdoors.
  • 高的: 8 vulnerabilities including WP Maps SQL Injection and WPCafe File Inclusion.
  • 中等的: 104 vulnerabilities.
  • Low: 2 vulnerabilities.

Vulnerabilities by CWE Type

  • 跨站腳本 (XSS): 66 vulnerabilities.
  • Missing Authorization: 16 vulnerabilities.
  • 跨站請求偽造 (CSRF): 15 vulnerabilities.
  • SQL注入: 4 vulnerabilities.
  • Path Traversal: 3 vulnerabilities.

漏洞的影響

These vulnerabilities can severely affect WordPress sites, leading to data breaches, site defacement, malware infections, and loss of user trust. For example, SQL Injection vulnerabilities can allow attackers to execute arbitrary SQL commands, potentially leading to unauthorized data access and modification. XSS vulnerabilities can enable attackers to inject malicious scripts into web pages viewed by other users, compromising their data and potentially spreading malware.

真實場景

  1. SQL Injection in PayPlus Payment Gateway: This could allow attackers to manipulate database queries, leading to unauthorized access to sensitive payment information.
  2. XSS in WordPress Core: Attackers could use this vulnerability to inject malicious scripts, potentially compromising admin accounts and spreading malware.

緩解措施和建議

Updating Plugins and Themes

  1. 定期更新: Ensure all plugins, themes, and WordPress core are updated to the latest versions. This includes enabling automatic updates where possible.
  2. Review Change Logs: Always review plugin and theme changelogs for any security-related updates.

Implementing Security Measures

  1. 雙重認證 (2FA): Implement 2FA for all admin accounts to add an extra layer of security.
  2. 定期備份: Schedule regular backups of your site to ensure data can be restored in case of an attack.
  3. 安全插件: Use security plugins to scan for vulnerabilities and protect against common threats.

Monitoring Site Activity

  1. Log Monitoring: Regularly monitor server and application logs for suspicious activity.
  2. User Activity Tracking: Use plugins to track user activity on your site to detect unauthorized changes.

具體漏洞的深入分析

PayPlus Payment Gateway SQL Injection

  • Severity: Critical (10.0 CVSS score)
  • Mechanics: This vulnerability allows unauthenticated users to inject malicious SQL commands.
  • Impact: Can lead to complete database compromise, unauthorized data access, and potential data corruption.
  • 減輕: Apply the available patch immediately and review database logs for any signs of exploitation.

WordPress Core XSS via HTML API

  • Severity: High
  • Mechanics: Authenticated users can inject malicious scripts that are stored and executed in the browser of anyone viewing the affected page.
  • Impact: Can lead to session hijacking, defacement, and spread of malware.
  • 減輕: Update to the latest WordPress core version and implement a Web Application Firewall (WAF) to block malicious scripts.

歷史比較

Comparing this week's report to previous weeks, there is a noticeable increase in medium-severity vulnerabilities. This could indicate a trend where more vulnerabilities are being discovered and patched before reaching critical severity levels. Additionally, the performance of specific plugins such as PayPlus Payment Gateway and Newspack Blocks has shown improvement due to recent patches.

結論

Staying updated with the latest vulnerability reports is crucial for maintaining the security and integrity of WordPress sites. Implementing recommended security practices and promptly applying patches can significantly reduce the risk of exploitation. For detailed vulnerability data and real-time updates, consider utilizing tools like the WP-Firewall vulnerability database and subscribing to security mailing lists. By staying vigilant and proactive, site administrators can protect their sites and user data from emerging threats.

Appendix – Full list of WordPress Vulnerability


wordpress security update banner

免費接收 WP 安全周刊 👋
立即註冊
!!

註冊以每週在您的收件匣中接收 WordPress 安全性更新。

我們不發送垃圾郵件!閱讀我們的 隱私權政策 了解更多。