{"id":18321,"date":"2022-02-20T10:45:05","date_gmt":"2022-02-20T18:45:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/02\/20\/news-12054\/"},"modified":"2022-02-20T10:45:05","modified_gmt":"2022-02-20T18:45:05","slug":"news-12054","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/02\/20\/news-12054\/","title":{"rendered":"Millions of WordPress Sites Got a Forced Update for a Serious Bug"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/6210494594a57925893abcc1\/master\/pass\/Security-Wordpress-Vulnerability-1337330498.jpg\"\/><\/p>\n<p><strong>Credit to Author: Dan Goodin, Ars Technica| Date: Sat, 19 Feb 2022 21:10:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/dan-goodin-ars-technica\">Dan Goodin, Ars Technica<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">Millions of WordPress<\/span> sites have received a forced update over the past day to fix a critical vulnerability in a plugin called UpdraftPlus.<\/p>\n<p class=\"paywall\">This story originally appeared on <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/millions-of-wordpress-sites-get-forced-update-to-patch-critical-plugin-flaw\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2022\/02\/millions-of-wordpress-sites-get-forced-update-to-patch-critical-plugin-flaw\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/millions-of-wordpress-sites-get-forced-update-to-patch-critical-plugin-flaw\/\" rel=\"nofollow noopener\" target=\"_blank\">Ars Technica<\/a>, a trusted source for technology news, tech policy analysis, reviews, and more. Ars is owned by WIRED&#x27;s parent company, Cond\u00e9 Nast.<\/p>\n<p class=\"paywall\">The mandatory patch came at the request of UpdraftPlus developers because of the severity of the <a href=\"https:\/\/www.wired.com\/tag\/vulnerabilities\/\">vulnerability<\/a>, which allows untrusted subscribers, customers, and others to download the site\u2019s private database as long as they have an account on the vulnerable site. Databases frequently include sensitive information about customers or the site\u2019s security settings, leaving millions of sites susceptible to serious <a href=\"https:\/\/www.wired.com\/story\/wired-guide-to-data-breaches\/\">data breaches<\/a> that spill passwords, user names, IP addresses, and more.<\/p>\n<p class=\"paywall\">UpdraftPlus simplifies the process of backing up and restoring website databases and is the internet\u2019s most widely used scheduled backup plugin for the WordPress content management system. It streamlines data backup to Dropbox, Google Drive, Amazon S3, and other cloud services. Its developers say it also allows users to schedule regular backups and is faster and uses fewer server resources than competing WordPress plugins.<\/p>\n<p class=\"paywall\">\u201cThis bug is pretty easy to exploit, with some very bad outcomes if it does get exploited,\u201d said Marc Montpas, the security researcher who discovered the vulnerability and privately reported it to the plugin developers. \u201cIt made it possible for low-privilege users to download a site&#x27;s backups, which include raw database backups. Low-privilege accounts could mean a lot of things. Regular subscribers, customers (on ecommerce sites, for example), etc.\u201d<\/p>\n<p class=\"paywall\">Montpas, a researcher at website security firm Jet, said he found the vulnerability during a security audit of the plugin and provided details to UpdraftPlus developers on Tuesday. A day later, the developers published a fix and agreed to force-install it on WordPress sites that had the plugin installed.<\/p>\n<p class=\"paywall\">Stats provided by WordPress.org\u00a0<a data-offer-url=\"https:\/\/wordpress.org\/plugins\/updraftplus\/advanced\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/wordpress.org\/plugins\/updraftplus\/advanced\/&quot;}\" href=\"https:\/\/wordpress.org\/plugins\/updraftplus\/advanced\/\" rel=\"nofollow noopener\" target=\"_blank\">show<\/a> that 1.7 million sites received the update on Thursday, and more than 287,000 more had installed it as of press time. WordPress says the plugin has 3+ million users.<\/p>\n<p class=\"paywall\">In disclosing the vulnerability on Thursday, UpdraftPlus\u00a0<a data-offer-url=\"https:\/\/updraftplus.com\/updraftplus-security-release-1-22-3-2-22-3\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/updraftplus.com\/updraftplus-security-release-1-22-3-2-22-3\/&quot;}\" href=\"https:\/\/updraftplus.com\/updraftplus-security-release-1-22-3-2-22-3\/\" rel=\"nofollow noopener\" target=\"_blank\">wrote<\/a>:<\/p>\n<p class=\"paywall\"><em>This defect allows any logged-in user on a WordPress installation with UpdraftPlus active to exercise the privilege of downloading an existing backup, a privilege which should have been restricted to administrative users only. This was possible because of a missing permissions check on code related to checking current backup status. This allowed the obtaining of an internal identifier which was otherwise unknown and could then be used to pass a check upon permission to download.<\/em><\/p>\n<p class=\"paywall\"><em>This means that if your WordPress site allows untrusted users to have a WordPress login, and if you have any existing backup, then you are potentially vulnerable to a technically skilled user working out how to download the existing backup. Affected sites are at risk of data loss \/ data theft via the attacker accessing a copy of your site\u2019s backup, if your site contains anything non-public. I say \u201ctechnically skilled\u201d because at that point, no public proof of how to leverage this exploit has been made. At this point in time, it relies upon a hacker reverse-engineering the changes in the latest UpdraftPlus release to work it out. However, you should certainly not rely upon this taking long but should update immediately. If you are the only user on your WordPress site, or if all your users are trusted, then you are not vulnerable, but we still recommend updating in any case.<\/em><\/p>\n<p class=\"paywall\">In his <a data-offer-url=\"https:\/\/jetpack.com\/2022\/02\/17\/severe-vulnerability-fixed-in-updraftplus-1-22-3\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/jetpack.com\/2022\/02\/17\/severe-vulnerability-fixed-in-updraftplus-1-22-3\/&quot;}\" href=\"https:\/\/jetpack.com\/2022\/02\/17\/severe-vulnerability-fixed-in-updraftplus-1-22-3\/\" rel=\"nofollow noopener\" target=\"_blank\">own disclosure<\/a>, Montpas said the vulnerability stemmed from several flaws. The first was in the <a data-offer-url=\"https:\/\/plugins.trac.wordpress.org\/browser\/updraftplus\/tags\/1.22.1\/class-updraftplus.php#L802\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/plugins.trac.wordpress.org\/browser\/updraftplus\/tags\/1.22.1\/class-updraftplus.php#L802&quot;}\" href=\"https:\/\/plugins.trac.wordpress.org\/browser\/updraftplus\/tags\/1.22.1\/class-updraftplus.php#L802\" rel=\"nofollow noopener\" target=\"_blank\">UpdraftPlus implementation<\/a> of the WordPress heartbeat function. UpdraftPlus didn\u2019t properly validate that users who sent requests had administrative privileges. That represented a serious problem because the function fetches a list of all active backup jobs and the date of the site\u2019s latest backup. Included in that data is the <a data-offer-url=\"https:\/\/plugins.trac.wordpress.org\/browser\/updraftplus\/tags\/1.22.1\/class-updraftplus.php#L802\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/plugins.trac.wordpress.org\/browser\/updraftplus\/tags\/1.22.1\/class-updraftplus.php#L802&quot;}\" href=\"https:\/\/plugins.trac.wordpress.org\/browser\/updraftplus\/tags\/1.22.1\/class-updraftplus.php#L802\" rel=\"nofollow noopener\" target=\"_blank\">custom nonce<\/a> that the plugin used to secure backups.<\/p>\n<p class=\"paywall\">\u201cAn attacker could thus craft a malicious request targeting this heartbeat callback to get access to information about the site\u2019s latest backup to date, which will, among other things, contain a backup\u2019s nonce,\u201d Montpas wrote.<\/p>\n<p class=\"paywall\">The next weak link was in the maybe_download_backup_from_email function. A variable the function used to validate that users are admins before allowing them to download a backup was vulnerable to hacks that allowed it to be modified by untrusted people.<\/p>\n<p class=\"paywall\">In a <a data-offer-url=\"https:\/\/www.wordfence.com\/blog\/2022\/02\/vulnerability-in-updraftplus-allowed-subscribers-to-download-sensitive-backups\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.wordfence.com\/blog\/2022\/02\/vulnerability-in-updraftplus-allowed-subscribers-to-download-sensitive-backups\/&quot;}\" href=\"https:\/\/www.wordfence.com\/blog\/2022\/02\/vulnerability-in-updraftplus-allowed-subscribers-to-download-sensitive-backups\/\" rel=\"nofollow noopener\" target=\"_blank\">separate analysis<\/a>, Ram Gall, a researcher at web security firm Wordfence, wrote:<\/p>\n<p class=\"paywall\"><em>The issue is the UpdraftPlus_Options::admin_page() === $pagenow check. This requires that the WordPress $pagenow global variable be set to options-general.php. Subscribers are typically not allowed to access this page. However, it is possible to spoof this variable on some server configurations, primarily Apache\/modPHP. Similar to a previous vulnerability in WordPress &lt; 5.5.1 also found by this researcher, it\u2019s possible to send a request to e.g. wp-admin\/admin-post.php\/%0A\/wp-admin\/options-general.php?page=updraftplus.<\/em><\/p>\n<p class=\"paywall\"><em>While subscribers cannot access options-general.php, they are allowed to access admin-post.php. By sending the request to this endpoint they can fool the $pagenow check into thinking that the request is to options-general.php, while WordPress still sees the request as being to an allowed endpoint of admin-post.php.<\/em><\/p>\n<p class=\"paywall\"><em>Once this check has been passed, the attacker will need to provide the backup nonce as well as a type parameter. Finally, as all backups are indexed by timestamp, the attacker will need to add a timestamp that is either bruteforced or obtained from the backup log obtained earlier.<\/em><\/p>\n<p class=\"paywall\">If you operate a site running on the WordPress CMS and it has UpdraftPlus installed, there\u2019s a good chance it has already been updated. To be sure, check that the plugin release number is either 1.22.4 or later for the free version or 2.22.4 or later for the premium version.<\/p>\n<p class=\"paywall\"><em>This story originally appeared on<\/em> <a data-offer-url=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/millions-of-wordpress-sites-get-forced-update-to-patch-critical-plugin-flaw\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/arstechnica.com\/information-technology\/2022\/02\/millions-of-wordpress-sites-get-forced-update-to-patch-critical-plugin-flaw\/&quot;}\" href=\"https:\/\/arstechnica.com\/information-technology\/2022\/02\/millions-of-wordpress-sites-get-forced-update-to-patch-critical-plugin-flaw\/\" rel=\"nofollow noopener\" target=\"_blank\"><em>Ars Technica<\/em><\/a><em>.<\/em><\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/wordpress-sites-get-forced-update-serious-vulnerability\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/6210494594a57925893abcc1\/master\/pass\/Security-Wordpress-Vulnerability-1337330498.jpg\"\/><\/p>\n<p><strong>Credit to Author: Dan Goodin, Ars Technica| Date: Sat, 19 Feb 2022 21:10:00 +0000<\/strong><\/p>\n<p>The mandatory patch addressed a critical vulnerability in a widely used plugin that allowed untrusted visitors to download a website&#8217;s backups.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21357],"class_list":["post-18321","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-security-news"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18321","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18321"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18321\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18321"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18321"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18321"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}