Exploitable Weaknesses Found in Popular POST SMTP Mailer Plugin Affecting 300,000 WordPress Sites

by | Jan 12, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

In a recent discovery, security researchers Ulysses Saicha and Sean Murphy from Wordfence identified two critical vulnerabilities in the widely-used POST SMTP Mailer WordPress plugin, an email delivery tool employed by approximately 300,000 websites. These vulnerabilities pose a significant threat, potentially allowing attackers to gain complete control over site authentication.

The first vulnerability, tracked as CVE-2023-6875, is a critical authorization bypass flaw resulting from a “type juggling” issue on the connect-app REST endpoint. This flaw affects all versions of the plugin up to version 2.8.7. Exploiting this flaw, an unauthenticated attacker can reset the API key and access sensitive log information, including password reset emails. By manipulating a function related to the mobile app, the attacker can set a valid token with a zero value for the authentication key, triggering a password reset for the site’s admin.

Vulnerable code handling the API requestVulnerable code handling the API request (Wordfence)

Subsequently, the attacker gains access to the key within the application, altering it and effectively locking the legitimate user out of their account.

With administrator privileges, the attacker can then execute actions like planting backdoors, modifying plugins and themes, and redirecting users to malicious destinations.

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

The second vulnerability, identified as CVE-2023-7027, is a cross-site scripting (XSS) issue stemming from insufficient input sanitization and output escaping. This flaw, affecting versions of POST SMTP up to 2.8.7, allows attackers to inject arbitrary scripts into the web pages of the affected site.

Wordfence promptly reported these critical flaws to the plugin’s vendor on December 8, 2023. Following the submission, they provided a proof-of-concept (PoC) exploit on December 15 for the authorization bypass flaw, and the XSS issue was reported on December 19, 2023, with a PoC shared the next day.




Responding to these findings, the plugin’s vendor released version 2.8.8 of POST SMTP on January 1, 2024, incorporating security fixes for both vulnerabilities. However, statistics from wordpress.org indicate that approximately 150,000 sites are still running versions of the plugin lower than 2.8, putting them at risk.
Additionally, among the remaining sites with version 2.8 and higher, the platform reports roughly 100,000 downloads since the patch release, suggesting that thousands might still be vulnerable.

Website administrators are strongly urged to update to version 2.8.8 immediately to safeguard their sites against potential exploitation.

Are u a security researcher? Or a company that writes articles or write ups about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing?

If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This