Active Exploits Hit WordPress Sites Vulnerable to Thrive Themes Flaws
Reading Time: 1 Minute
Thrive Themes has recently patched vulnerabilities in its WordPress plugins and legacy Themes – but attackers are targeting those who haven’t yet applied security updates.
Attackers are actively exploiting two recently-patched vulnerabilities in a popular suite of tools for WordPress websites from marketing platform Thrive Themes.
Thrive Themes offers various products to help WordPress websites “convert visitors into leads and customers.” Its suite of products, called Thrive Suite, includes a lineup of Legacy Themes – tools to help change the layout and design of WordPress websites – as well as various plugins. These plugins offer various website development and visual functionalities, including Thrive Architect, which helps site owners create website landing pages, and Thrive Comments, which helps them implement engaging comments sections.
Two vulnerabilities were discovered across both these Legacy Themes and plugins, and patches were subsequently released on March 12. The flaws could be chained together to allow unauthenticated attackers ultimately upload arbitrary files on vulnerable WordPress sites – allowing for website compromise.
However, despite patches being released, researchers are seeing a wave of exploits attempts begin – and they warn that more than 100,000 WordPress sites using Thrive Themes products may still be vulnerable.
“We are seeing these vulnerabilities being actively exploited in the wild, and we urge users to update to the latest versions available immediately since they contain a patch for these vulnerabilities,” according to Chloe Chamberland, threat analyst with Wordfence on Wednesday.
Below are a list of affected versions of Thrive Themes Legacy Themes and plugins, according to Wordfence:
- All Legacy Themes, including Rise, Ignition, and others | Version < 2.0.0
- Thrive Optimize | Version < 1.4.13.3
- Thrive Comments | Version < 1.4.15.3
- Thrive Headline Optimizer | Version < 1.3.7.3
- Thrive Themes Builder | Version < 2.2.4
- Thrive Leads Version | < 2.3.9.4
- Thrive Ultimatum Version | < 2.3.9.4
- Thrive Quiz Builder Version | < 2.3.9.4
- Thrive Apprentice | Version < 2.3.9.4
- Thrive Architect | Version < 2.6.7.4
- Thrive Dashboard | Version < 2.3.9.3
See Also: Offensive Security Tool: Skipfish
The Exploit Chain
Chamberland said that attackers can chain these two vulnerabilities together in order to access affected websites – though Chamberland noted, researchers are intentionally providing minimal details about the exploit chain “in an attempt to keep exploitation to a minimum while also informing WordPress site owners using affected Thrive Theme products of this active campaign.”
At a high level, attackers are using the medium-severity “Unauthenticated Option Update” vulnerability to update an option in the database. This can then be used to leverage the critical-severity “Unauthenticated Arbitrary File Upload” vulnerability – and upload a malicious PHP file.
“The combination of these two vulnerabilities is allowing attackers to gain backdoor access into vulnerable sites to further compromise them,” said Chamberland.
Attacker Exploits Continue
Researchers were able to “verify this intrusion vector” on an individual site – and they then found the payload added by this attack on over 1,900 sites, all of which appear to have vulnerable REST API endpoints.
Chamberland told Threatpost, researchers are seeing attackers add a signup.php file to the home directory of targeted sites, which is then being used to further infect sites with spam.
“This number is continuing to rise indicating that the attackers are continuing to successfully exploit the vulnerabilities and compromise sites,” Chamberland told Threatpost. “Right now, we don’t have an idea how who specifically per se is behind the attacks, however, most of the attack data we are seeing is primarily coming from an attacker with the IP address of 5.255.176.41.”
Chamberland said, Thrive Themes users should make sure they’re updated as soon as possible.
“For the time being, we urge that site owners running any of the Thrive Themes ‘legacy’ themes to update to version 2.0.0 immediately, and any site owners running any of the Thrive plugins to update to the latest version available for each of the respective plugins,” she stressed.
Source: https://threatpost.com
(Click Link)