Updates on CyberSecurity, WordPress and what we're cooking in the lab today.

3 Zero-Day Plugin Vulnerabilities Being Exploited In The Wild

This entry was posted in Vulnerabilities, WordPress Security on October 2, 2017 by Brad Haas   6 Replies

As part of our site cleaning service, our security analysts track down the method the attacker used to compromise the site. Often this involves quite a bit of investigative work, and recently it led us to find 0-day exploits in three separate plugins. The exploits were elusive: a malicious file seemed to appear out of nowhere, and even sites with access logs only showed a POST request to /wp-admin/admin-ajax.php at the time the file was created. But we captured the attacks in our threat data, and our lead developer Matt Barry was able to reconstruct the exploits. We quickly pushed new WAF rules to block these exploits. Premium customers received the new rules and were protected immediately. We also notified the plugin authors; all three have published updates to fix the vulnerabilities.

PHP Object Injection Vulnerability Severity 9.8 (Critical) in Appointments, RegistrationMagic-Custom Registration Forms, and Flickr Gallery

Affected plugins and versions:

This vulnerability allowed attackers to cause a vulnerable website to fetch a remote file (a PHP backdoor) and save it to a location of their choice. It required no authentication or elevated privileges. For sites running Flickr Gallery, the attackers only had to send the exploit as POST request to the site’s root URL. For the other two plugins, the request would go to admin-ajax.php. If the attacker was able to access their backdoor, they could completely take over the vulnerable site.

CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

What To Do

If you are running the Premium version of Wordfence and have the firewall enabled, our new firewall rules are already protecting you. Free users of Wordfence and paid users who have the Wordfence firewall disabled and are running these plugins should update to the most recent versions immediately.

Did you enjoy this post? Share it!


3.69 (26 votes) Your rating:

6 Comments on "3 Zero-Day Plugin Vulnerabilities Being Exploited In The Wild"

yoo October 2, 2017 at 2:48 pm • Reply

thanks guys

Peter October 2, 2017 at 2:49 pm • Reply

Thanks a lot to the Wordfence team! My site Freunde.one was effected aswell and I use the RegistrationMagic plugin there. The issue happened two times in one week! I lost a lot of time fixing the issue.

Yahkal October 2, 2017 at 3:03 pm • Reply

Thanks for the info

Gary October 2, 2017 at 3:36 pm • Reply

Thanks for helping me sleep better at night.

Ron October 2, 2017 at 4:28 pm • Reply

I am a little confused. Your article is dated today, Oct 2 2017, and even though my copy of Wordfence says it is up to date with v6.3.19, my plugin details page shows the last update was 2 weeks ago. Am I missing something?

I try to keep things uptodate on all my websites that run Wordfence and while I am not running any of the listed plugins here, seeing something that is out of whack makes we curious.

Please advise.

Dan Moen October 2, 2017 at 4:39 pm • Reply

Hi Ron, firewall rule updates are delivered via the Thread Defense Feed and do not require a Wordfence plugin update. Since you're not running any of the plugins listed you don't need to take any action.

Get the latest WordPress security updates and news

Sign up for WordPress security alerts, Wordfence product updates and security news via email.