February 28, 2020

WordPress Releases Security Hardening Update

The WordPress project has announced the releases of WordPress 3.0.5. Dubbed as a security hardening release it is an essential update for those with any untrusted user accounts, but it also comes with other important security enhancements and hardening for all WordPress installations.

Two cross site scripting bugs have been squashed:

  • Properly encode title used in Quick/Bulk Edit, and offer additional sanitization to various fields. Affects users of the Author or Contributor role.
  • Preserve tag escaping in the tags meta box. Affects users of the Author or Contributor role.

Also included in 3.0.5 are two security enhancements one of which improves the security of any plugins which were not properly leveraging the WordPress security API.

All WordPress administrators are encouraged to upgrade to this latest version. You can update automatically from the Dashboard > Updates menu in your site’s admin area or download 3.0.5 directly.

Cross-Site Scripting (XSS) Vulnerability in phpMyAdmin

phpMyAdmin is prone to a cross-site scripting vulnerability due to insufficient user-supplied data sanitization.

According to the vulnerability disclosure, an attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. The attacker must entice an unsuspecting user to follow a malicious URI. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.

All versions prior to phpMyAdmin and are vulnerable. Updates are available to fix this issue.

Critical Security Update for WordPress

Version 3.0.4 of WordPress has released. This version is available from the update page in the WordPress dashboard or for download here. This is a critical update to fixes a core security bug in WordPress HTML sanitation library, called KSES. This security issue has been discovered by Mauro Gentile and Jon Cave (duck_).

More technical information is available here.

Security Issue in Google Website Optimizer

Google has informed its users directly about a security issue in Google Website Optimizer.

Google has warned the Website Optimizer users about a vulnerability in the Website Optimizer Control Script. According to the Google email, an attacker might be able to execute malicious code on a user site using a Cross-Site Scripting (XSS) attack. This attack can only take place if a website or browser has already been compromised by a separate attack.

[Read more…]

Multiple XSS vulnerabilities in WordPress Register Plus plugin

WordPress Register Plus plugin that enhance the WordPress registration page by adding custom logo, invitation codes, disclaimers, CAPTCHA validation, email validation and user moderation has multiople Cross Site Scripting (XSS) vulnerabilities.

According to Securityfocus.com, an attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.

These multiple cross-site scripting vulnerabilities have been classified as input validation error due to Register Plus issue to properly sanitize user-supplied input.
Register Plus 3.5.1 is vulnerable; other versions may also be affected.

Related Article:

http://websecurity.com.ua/4539 (Russian)